3v4l.org

run code in 300+ PHP versions simultaneously
<?php $salt = '$2a$07$usesomesillystringfore'; $result = crypt('a681fc3f11197c8116006c1a603e027c',$salt); echo $result;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/VVk6s
function name:  (null)
number of ops:  8
compiled vars:  !0 = $salt, !1 = $result
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%242a%2407%24usesomesillystringfore'
    3     1        INIT_FCALL                                               'crypt'
          2        SEND_VAL                                                 'a681fc3f11197c8116006c1a603e027c'
          3        SEND_VAR                                                 !0
          4        DO_ICALL                                         $3      
          5        ASSIGN                                                   !1, $3
    4     6        ECHO                                                     !1
          7      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.38 ms | 934 KiB | 16 Q