3v4l.org

run code in 300+ PHP versions simultaneously
<?php if (CRYPT_BLOWFISH == 1) { echo 'Blowfish: ' . crypt('rasmuslerdorf', '$2a$07$use/somesillystringforsalt$') . "\n"; } if (CRYPT_SHA256 == 1) { echo 'SHA-256: ' . crypt('rasmuslerdorf', '$5$rounds=5000$use/somesillystringforsalt$') . "\n"; } if (CRYPT_SHA512 == 1) { echo 'SHA-512: ' . crypt('rasmuslerdorf', '$6$rounds=5000$use/somesillystringforsalt$') . "\n"; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 8
Branch analysis from position: 1
2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 16
Branch analysis from position: 9
2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 24
Branch analysis from position: 17
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 24
Branch analysis from position: 16
Branch analysis from position: 8
filename:       /in/TYLR7
function name:  (null)
number of ops:  25
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E > > JMPZ                                                     <true>, ->8
    3     1    >   INIT_FCALL                                               'crypt'
          2        SEND_VAL                                                 'rasmuslerdorf'
          3        SEND_VAL                                                 '%242a%2407%24use%2Fsomesillystringforsalt%24'
          4        DO_ICALL                                         $0      
          5        CONCAT                                           ~1      'Blowfish%3A+++++', $0
          6        CONCAT                                           ~2      ~1, '%0A'
          7        ECHO                                                     ~2
    6     8    > > JMPZ                                                     <true>, ->16
    7     9    >   INIT_FCALL                                               'crypt'
         10        SEND_VAL                                                 'rasmuslerdorf'
         11        SEND_VAL                                                 '%245%24rounds%3D5000%24use%2Fsomesillystringforsalt%24'
         12        DO_ICALL                                         $3      
         13        CONCAT                                           ~4      'SHA-256%3A++++++', $3
         14        CONCAT                                           ~5      ~4, '%0A'
         15        ECHO                                                     ~5
   10    16    > > JMPZ                                                     <true>, ->24
   11    17    >   INIT_FCALL                                               'crypt'
         18        SEND_VAL                                                 'rasmuslerdorf'
         19        SEND_VAL                                                 '%246%24rounds%3D5000%24use%2Fsomesillystringforsalt%24'
         20        DO_ICALL                                         $6      
         21        CONCAT                                           ~7      'SHA-512%3A++++++', $6
         22        CONCAT                                           ~8      ~7, '%0A'
         23        ECHO                                                     ~8
   12    24    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.21 ms | 1395 KiB | 15 Q