3v4l.org

run code in 300+ PHP versions simultaneously
<?php $salt = "e7655f410aa38e1ca05de7a7fd8fb84c"; $password = "vibhor123"; echo(hash_pbkdf2("sha256", $password, hex2bin($salt), 4096));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/IIXFM
function name:  (null)
number of ops:  13
compiled vars:  !0 = $salt, !1 = $password
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'e7655f410aa38e1ca05de7a7fd8fb84c'
    4     1        ASSIGN                                                   !1, 'vibhor123'
    5     2        INIT_FCALL                                               'hash_pbkdf2'
          3        SEND_VAL                                                 'sha256'
          4        SEND_VAR                                                 !1
          5        INIT_FCALL                                               'hex2bin'
          6        SEND_VAR                                                 !0
          7        DO_ICALL                                         $4      
          8        SEND_VAR                                                 $4
          9        SEND_VAL                                                 4096
         10        DO_ICALL                                         $5      
         11        ECHO                                                     $5
         12      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
164.04 ms | 1398 KiB | 17 Q