3v4l.org

run code in 300+ PHP versions simultaneously
<?php if (CRYPT_BLOWFISH == 1) { echo 'Blowfish: ' . crypt('ohgakiyasuo','$2y$12$usesomesillystringforsalt$') . "\n"; } if (CRYPT_SHA256 == 1) { echo 'SHA-256: ' . crypt('ohgakiyasuo','$5$rounds=9000$usesomesillystringforsalt$') . "\n"; } if (CRYPT_SHA512 == 1) { echo 'SHA-512: ' . crypt('ohgakiyasuo','$6$rounds=9000$usesomesillystringforsalt$') . "\n"; } // 無効な文字や空文字を指定した場合。エラー文字列が返る echo 'Blowfish: ' . crypt('ohgakiyasuo', '$2a$07$!"#$%&\'()0=~!"#$%&\'()0!"$') . "\n"; echo 'Blowfish: ' . crypt('ohgakiyasuo', '$2a$07$') . "\n"; // roundsでなくroundと間違っている。"round=9000"がソルトとして扱われる。 echo 'SHA-512: ' . crypt('ohgakiyasuo', '$6$round=9000$usesomesillystringforsalt$') . "\n"; // ソルト文字列に$が含まれていると、そこまでがソルトとなる echo 'SHA-512: ' . crypt('ohgakiyasuo', '$6$rounds=9000$usesome$sillystringforsalt$') . "\n"; // ソルト文字列なしでも利用可能(非推奨) echo 'SHA-512: ' . crypt('ohgakiyasuo', '$6$'). "\n";
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 8
Branch analysis from position: 1
2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 16
Branch analysis from position: 9
2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 24
Branch analysis from position: 17
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 24
Branch analysis from position: 16
Branch analysis from position: 8
filename:       /in/AGM16
function name:  (null)
number of ops:  60
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E > > JMPZ                                                     <true>, ->8
    4     1    >   INIT_FCALL                                               'crypt'
          2        SEND_VAL                                                 'ohgakiyasuo'
          3        SEND_VAL                                                 '%242y%2412%24usesomesillystringforsalt%24'
          4        DO_ICALL                                         $0      
          5        CONCAT                                           ~1      'Blowfish%3A+++++', $0
          6        CONCAT                                           ~2      ~1, '%0A'
          7        ECHO                                                     ~2
    6     8    > > JMPZ                                                     <true>, ->16
    8     9    >   INIT_FCALL                                               'crypt'
         10        SEND_VAL                                                 'ohgakiyasuo'
         11        SEND_VAL                                                 '%245%24rounds%3D9000%24usesomesillystringforsalt%24'
         12        DO_ICALL                                         $3      
         13        CONCAT                                           ~4      'SHA-256%3A++++++', $3
         14        CONCAT                                           ~5      ~4, '%0A'
         15        ECHO                                                     ~5
   10    16    > > JMPZ                                                     <true>, ->24
   12    17    >   INIT_FCALL                                               'crypt'
         18        SEND_VAL                                                 'ohgakiyasuo'
         19        SEND_VAL                                                 '%246%24rounds%3D9000%24usesomesillystringforsalt%24'
         20        DO_ICALL                                         $6      
         21        CONCAT                                           ~7      'SHA-512%3A++++++', $6
         22        CONCAT                                           ~8      ~7, '%0A'
         23        ECHO                                                     ~8
   16    24    >   INIT_FCALL                                               'crypt'
         25        SEND_VAL                                                 'ohgakiyasuo'
         26        SEND_VAL                                                 '%242a%2407%24%21%22%23%24%25%26%27%28%290%3D%7E%21%22%23%24%25%26%27%28%290%21%22%24'
         27        DO_ICALL                                         $9      
         28        CONCAT                                           ~10     'Blowfish%3A+++++', $9
         29        CONCAT                                           ~11     ~10, '%0A'
         30        ECHO                                                     ~11
   17    31        INIT_FCALL                                               'crypt'
         32        SEND_VAL                                                 'ohgakiyasuo'
         33        SEND_VAL                                                 '%242a%2407%24'
         34        DO_ICALL                                         $12     
         35        CONCAT                                           ~13     'Blowfish%3A+++++', $12
         36        CONCAT                                           ~14     ~13, '%0A'
         37        ECHO                                                     ~14
   20    38        INIT_FCALL                                               'crypt'
         39        SEND_VAL                                                 'ohgakiyasuo'
         40        SEND_VAL                                                 '%246%24round%3D9000%24usesomesillystringforsalt%24'
         41        DO_ICALL                                         $15     
         42        CONCAT                                           ~16     'SHA-512%3A++++++', $15
         43        CONCAT                                           ~17     ~16, '%0A'
         44        ECHO                                                     ~17
   23    45        INIT_FCALL                                               'crypt'
         46        SEND_VAL                                                 'ohgakiyasuo'
         47        SEND_VAL                                                 '%246%24rounds%3D9000%24usesome%24sillystringforsalt%24'
         48        DO_ICALL                                         $18     
         49        CONCAT                                           ~19     'SHA-512%3A++++++', $18
         50        CONCAT                                           ~20     ~19, '%0A'
         51        ECHO                                                     ~20
   25    52        INIT_FCALL                                               'crypt'
         53        SEND_VAL                                                 'ohgakiyasuo'
         54        SEND_VAL                                                 '%246%24'
         55        DO_ICALL                                         $21     
         56        CONCAT                                           ~22     'SHA-512%3A++++++', $21
         57        CONCAT                                           ~23     ~22, '%0A'
         58        ECHO                                                     ~23
         59      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
221.07 ms | 1400 KiB | 15 Q