3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo "mi_P4ssW0rd"; $hash = '$2y$07$BCryptRequires22Chrcte/VlQH0piJtjXl.0t1XkA8pw9dMXTpOq'; if (password_verify('rasmuslerdorf', $hash)) { echo 'Password is valid!'; } else { echo 'Invalid password.'; } ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 9
Branch analysis from position: 7
1 jumps found. (Code = 42) Position 1 = 10
Branch analysis from position: 10
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 9
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/Jaqb3
function name:  (null)
number of ops:  11
compiled vars:  !0 = $hash
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ECHO                                                     'mi_P4ssW0rd'
    3     1        ASSIGN                                                   !0, '%242y%2407%24BCryptRequires22Chrcte%2FVlQH0piJtjXl.0t1XkA8pw9dMXTpOq'
    5     2        INIT_FCALL                                               'password_verify'
          3        SEND_VAL                                                 'rasmuslerdorf'
          4        SEND_VAR                                                 !0
          5        DO_ICALL                                         $2      
          6      > JMPZ                                                     $2, ->9
    6     7    >   ECHO                                                     'Password+is+valid%21'
          8      > JMP                                                      ->10
    8     9    >   ECHO                                                     'Invalid+password.'
   10    10    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
149.55 ms | 1394 KiB | 15 Q