3v4l.org

run code in 300+ PHP versions simultaneously
<?php if (CRYPT_STD_DES == 1) { echo 'Standard DES: ' . crypt('rasmuslerdorf', 'rl') . "\n"; } if (CRYPT_EXT_DES == 1) { echo 'Extended DES: ' . crypt('rasmuslerdorf', '_J9..rasm') . "\n"; } if (CRYPT_MD5 == 1) { echo 'MD5: ' . crypt('rasmuslerdorf', '$1$rasmusle$') . "\n"; } if (CRYPT_BLOWFISH == 1) { echo 'Blowfish: ' . crypt('rasmuslerdorf', '$2a$07$usesomesillystringforsalt$') . "\n"; } if (CRYPT_SHA256 == 1) { echo 'SHA-256: ' . crypt('rasmuslerdorf', '$5$rounds=5000$usesomesillystringforsalt$') . "\n"; } if (CRYPT_SHA512 == 1) { echo 'SHA-512: ' . crypt('rasmuslerdorf', '$6$rounds=5000$usesomesillystringforsalt$') . "\n"; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 8
Branch analysis from position: 1
2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 16
Branch analysis from position: 9
2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 24
Branch analysis from position: 17
2 jumps found. (Code = 43) Position 1 = 25, Position 2 = 32
Branch analysis from position: 25
2 jumps found. (Code = 43) Position 1 = 33, Position 2 = 40
Branch analysis from position: 33
2 jumps found. (Code = 43) Position 1 = 41, Position 2 = 48
Branch analysis from position: 41
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 48
Branch analysis from position: 40
Branch analysis from position: 32
Branch analysis from position: 24
Branch analysis from position: 16
Branch analysis from position: 8
filename:       /in/DTcbU
function name:  (null)
number of ops:  49
compiled vars:  none
line     #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   2     0  E > > JMPZ                                                     <true>, ->8
   3     1    >   INIT_FCALL                                               'crypt'
         2        SEND_VAL                                                 'rasmuslerdorf'
         3        SEND_VAL                                                 'rl'
         4        DO_ICALL                                         $0      
         5        CONCAT                                           ~1      'Standard+DES%3A+', $0
         6        CONCAT                                           ~2      ~1, '%0A'
         7        ASSIGN_OBJ                                               ~2
   6     8    > > JMPZ                                                     <true>, ->16
   7     9    >   INIT_FCALL                                               'crypt'
        10        SEND_VAL                                                 'rasmuslerdorf'
        11        SEND_VAL                                                 '_J9..rasm'
        12        DO_ICALL                                         $3      
        13        CONCAT                                           ~4      'Extended+DES%3A+', $3
        14        CONCAT                                           ~5      ~4, '%0A'
        15        ASSIGN_OBJ                                               ~5
  10    16    > > JMPZ                                                     <true>, ->24
  11    17    >   INIT_FCALL                                               'crypt'
        18        SEND_VAL                                                 'rasmuslerdorf'
        19        SEND_VAL                                                 '%241%24rasmusle%24'
        20        DO_ICALL                                         $6      
        21        CONCAT                                           ~7      'MD5%3A++++++++++', $6
        22        CONCAT                                           ~8      ~7, '%0A'
        23        ASSIGN_OBJ                                               ~8
  14    24    > > JMPZ                                                     <true>, ->32
  15    25    >   INIT_FCALL                                               'crypt'
        26        SEND_VAL                                                 'rasmuslerdorf'
        27        SEND_VAL                                                 '%242a%2407%24usesomesillystringforsalt%24'
        28        DO_ICALL                                         $9      
        29        CONCAT                                           ~10     'Blowfish%3A+++++', $9
        30        CONCAT                                           ~11     ~10, '%0A'
        31        ASSIGN_OBJ                                               ~11
  18    32    > > JMPZ                                                     <true>, ->40
  19    33    >   INIT_FCALL                                               'crypt'
        34        SEND_VAL                                                 'rasmuslerdorf'
        35        SEND_VAL                                                 '%245%24rounds%3D5000%24usesomesillystringforsalt%24'
        36        DO_ICALL                                         $12     
        37        CONCAT                                           ~13     'SHA-256%3A++++++', $12
        38        CONCAT                                           ~14     ~13, '%0A'
        39        ASSIGN_OBJ                                               ~14
  22    40    > > JMPZ                                                     <true>, ->48
  23    41    >   INIT_FCALL                                               'crypt'
        42        SEND_VAL                                                 'rasmuslerdorf'
        43        SEND_VAL                                                 '%246%24rounds%3D5000%24usesomesillystringforsalt%24'
        44        DO_ICALL                                         $15     
        45        CONCAT                                           ~16     'SHA-512%3A++++++', $15
        46        CONCAT                                           ~17     ~16, '%0A'
        47        ASSIGN_OBJ                                               ~17
  24    48    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 7.4.0