3v4l.org

run code in 150+ php & hhvm versions
Bugs & Features
<?php $crypt = crypt('rasmuslerdorf', '$2y$07$usesomesillystringforsalt$'); $password_hash = password_hash('rasmuslerdorf', PASSWORD_BLOWFISH); var_dump( $crypt, $password_hash, password_verify('rasmuslerdorf', $crypt), // ik gebruik password_hash() en crypt() door elkaar! $verify = crypt('rasmuslerdorf', $password_hash), $verify == $password_hash // nu doe ik het nog een keer! );
Output for 7.1.0
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$OUnlXQPK$EJnVwzNKQuwE77v/8390E1" bool(false)
Output for 7.0.14
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$0d6nMIor$G0xjc/WYb/mPy6QO9qAhe." bool(false)
Output for 7.0.6
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$fc8S.sAi$bop4AvFGR/v9Vl13EQ5wj/" bool(false)
Output for 7.0.5
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$fJ0AXeSp$HNelYZl5xgTmh/orv8.NI/" bool(false)
Output for 7.0.4
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$MALyERED$n5.t.rYSIpboJdYpNsA8U0" bool(false)
Output for 7.0.3
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$eMM68fV7$GpvLH2Q9zaPQnBeLNV/hd0" bool(false)
Output for 7.0.2
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$cF9nN1aE$cK2eAWkW18tM4YnFkc28x0" bool(false)
Output for 7.0.1
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$URuCpX8/$NcHAGuAjwm8uNgqNJy9I2/" bool(false)
Output for 7.0.0
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be integer, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$4y5tkSGj$kAt/8tUH1QcWY104pZ2yV1" bool(false)
Output for hhvm-3.10.0 - 3.12.0
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Catchable fatal error: Argument 2 passed to password_hash() must be an instance of int, string given in /in/Fh3TC on line 4
Process exited with code 255.
Output for 5.6.28
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$8quXy1gH$ZK8UlPgjRHCaeLACqXr9L0" bool(false)
Output for 5.6.21
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$6UUZc/X5$m.CZKslP9//wqpXeqy9Fh." bool(false)
Output for 5.6.20
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$.plbTbRI$H/oG1sbkSMf1ukKUN9ixW/" bool(false)
Output for 5.6.19
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$xv89sftM$4rDF8Ley/zsDu7zVEhAjz0" bool(false)
Output for 5.6.18
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$JZWApAD/$HRTYIkpiqk6Nx3nk17U3Y/" bool(false)
Output for 5.6.17
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$IeZsiuqP$fMOZezkrj1KI8Vp5hQVEP." bool(false)
Output for 5.6.16
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$0sesXiik$V/uiqcjtvMmeQ5gdlvJnN1" bool(false)
Output for 5.6.15
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$0AKSmz0A$ANQcDy/6EaI5cEUZS1vlP." bool(false)
Output for 5.6.14
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$VHS.cJYI$TkhOE16JVLlq3nm7sRdHo0" bool(false)
Output for 5.6.13
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$ojOIL8Ti$NF0jgRSs3ej7aM7VHFgxg/" bool(false)
Output for 5.6.12
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$TkM4/vRA$QL.g2o49XDNSrxCNowAJU/" bool(false)
Output for 5.6.11
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$6eDFKb2F$Sbzo65.LoLQgn9Qrmmt7k." bool(false)
Output for 5.6.10
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$YdqIWgqG$UmIwMo6fe0kyjlqulw7tC1" bool(false)
Output for 5.6.9
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$wFuvAap8$eq8Af72/4QemzhsVUBdfk0" bool(false)
Output for 5.6.8
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$Wqab.oG.$elZZ.mcj5wKGf4djMSIqp1" bool(false)
Output for 5.6.7
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$MHlGy.y.$GsKKXnnPuGHeVFUGXVeFz0" bool(false)
Output for 5.5.35
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$8pI1/QyU$F7EX.t36hIYjtxLEngLJA1" bool(false)
Output for 5.5.34
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$iRX8xpso$Aa5xaxK/4.A/hreq/BI1K1" bool(false)
Output for 5.5.33
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$9fAQ0ER0$7aZbM9mUre6wYxDtNjkVe." bool(false)
Output for 5.5.32
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$2MEDEka.$.SFx3DnRWh0VWUm3NgDO30" bool(false)
Output for 5.5.31
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$nJ5TmmuN$tCxVTmfRdpGnu1SgAZY820" bool(false)
Output for 5.5.30
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$xuzL/tWz$pAMud6QFhoAmZZFf31Gos1" bool(false)
Output for 5.5.29
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$emKJ4a8Y$k0eX.xGXkeNFbCZJwSt9F/" bool(false)
Output for 5.5.28
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$kvHLncfk$b2dqVik62clCtargJ3Nfs1" bool(false)
Output for 5.5.27
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$w16Z4qk7$3tQ3Ivffr1iOQXhmPnszB1" bool(false)
Output for 5.5.26
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$Ahq2msy9$/DE/2e3HiOCWZhqVJSKiW/" bool(false)
Output for 5.5.25
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$J3PkTriZ$ZlABL.9s57Qsgv0a7o//s1" bool(false)
Output for 5.5.24
Notice: Use of undefined constant PASSWORD_BLOWFISH - assumed 'PASSWORD_BLOWFISH' in /in/Fh3TC on line 4 Warning: password_hash() expects parameter 2 to be long, string given in /in/Fh3TC on line 4 string(60) "$2y$07$usesomesillystringfore2uDLvp1Ii2e./U9C8sBjqp8I90dH6hi" NULL bool(true) string(34) "$1$ZiIoSPtG$LabDVJdfa6GpX3O2OpITt1" bool(false)
Output for 5.3.0 - 5.4.45
Fatal error: Call to undefined function password_hash() in /in/Fh3TC on line 4
Process exited with code 255.
Output for 4.3.0 - 5.2.17

Process exited with code 139.