3v4l.org

run code in 300+ PHP versions simultaneously
<?php declare(strict_types=1); /** * Verify a Django password (PBKDF2-SHA256) * * @param string $password The password provided by the user * @param string $djangoHash The hash stored in the Django app * @return bool * @throws Exception */ function django_password_verify(string $password, string $djangoHash): bool { $pieces = explode('$', $djangoHash); if (count($pieces) !== 4) { throw new Exception("Illegal hash format"); } list($header, $iter, $salt, $hash) = $pieces; // Get the hash algorithm used: if (preg_match('#^pbkdf2_([a-z0-9A-Z]+)$#', $header, $m)) { $algo = $m[1]; } else { throw new Exception(sprintf("Bad header (%s)", $header)); } if (!in_array($algo, hash_algos())) { throw new Exception(sprintf("Illegal hash algorithm (%s)", $algo)); } $calc = hash_pbkdf2($algo, $password, base64_decode($salt), (int) $iterations); var_dump($calc); return false; } var_dump(django_password_verify('123', 'pbkdf2_sha256$20000$MflWfLXbejfO$tNrjk42YE9ZXkg7IvXY5fikbC+H52Ipd2mf7m0azttk='));
Output for git.master, git.master_jit, rfc.property-hooks
Warning: Undefined variable $iterations in /in/KVaSt on line 29 Fatal error: Uncaught ValueError: hash_pbkdf2(): Argument #4 ($iterations) must be greater than 0 in /in/KVaSt:29 Stack trace: #0 /in/KVaSt(29): hash_pbkdf2('sha256', Object(SensitiveParameterValue), '1\xF9V|\xB5\xDBz7\xCE', 0) #1 /in/KVaSt(34): django_password_verify('123', 'pbkdf2_sha256$2...') #2 {main} thrown in /in/KVaSt on line 29
Process exited with code 255.

This tab shows result from various feature-branches currently under review by the php developers. Contact me to have additional branches featured.

Active branches

Archived branches

Once feature-branches are merged or declined, they are no longer available. Their functionality (when merged) can be viewed from the main output page


preferences:
194.99 ms | 406 KiB | 5 Q