3v4l.org

run code in 300+ PHP versions simultaneously
<?php // See the password_hash() example to see where this came from. $hash = '$2y$07$BCryptRequires22Chrcte/VlQH0piJtjXl.0t1XkA8pw9dMXTpOq'; if (password_verify('rasmuslerdorf', $hash)) { echo 'Password is valid!'; } else { echo 'Invalid password.'; } ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 8
Branch analysis from position: 6
1 jumps found. (Code = 42) Position 1 = 9
Branch analysis from position: 9
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 8
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/OWqDd
function name:  (null)
number of ops:  10
compiled vars:  !0 = $hash
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '%242y%2407%24BCryptRequires22Chrcte%2FVlQH0piJtjXl.0t1XkA8pw9dMXTpOq'
    5     1        INIT_FCALL                                               'password_verify'
          2        SEND_VAL                                                 'rasmuslerdorf'
          3        SEND_VAR                                                 !0
          4        DO_ICALL                                         $2      
          5      > JMPZ                                                     $2, ->8
    6     6    >   ECHO                                                     'Password+is+valid%21'
          7      > JMP                                                      ->9
    8     8    >   ECHO                                                     'Invalid+password.'
   10     9    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
160.54 ms | 1385 KiB | 15 Q