3v4l.org

run code in 300+ PHP versions simultaneously
<?php $max_length_bcrypt = '5a0a90c7caaa07139c8d1bfd848bda29571157799e2abbafe74065e827c01dd29d30f0f1'; $max_length_bcrypt_plus_extra = '5a0a90c7caaa07139c8d1bfd848bda29571157799e2abbafe74065e827c01dd29d30f0f1ae3531ac1956aba81cb4f3d4947f9ca99794132989789acb13655645'; var_dump($max_length_bcrypt, $max_length_bcrypt_plus_extra); $hash_options = [ 'salt' => '31c990a8b44218cc483712' // some awful salt ]; $hash_1 = password_hash($max_length_bcrypt, PASSWORD_BCRYPT, ['salt' => $time_based_awful_salt]); $hash_2 = password_hash($max_length_bcrypt_plus_extra, PASSWORD_BCRYPT, ['salt' => $time_based_awful_salt]); var_dump($hash_1, $hash_2); var_dump($hash_1 === $hash_2);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/WMrIf
function name:  (null)
number of ops:  30
compiled vars:  !0 = $max_length_bcrypt, !1 = $max_length_bcrypt_plus_extra, !2 = $hash_options, !3 = $hash_1, !4 = $time_based_awful_salt, !5 = $hash_2
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '5a0a90c7caaa07139c8d1bfd848bda29571157799e2abbafe74065e827c01dd29d30f0f1'
    4     1        ASSIGN                                                   !1, '5a0a90c7caaa07139c8d1bfd848bda29571157799e2abbafe74065e827c01dd29d30f0f1ae3531ac1956aba81cb4f3d4947f9ca99794132989789acb13655645'
    6     2        INIT_FCALL                                               'var_dump'
          3        SEND_VAR                                                 !0
          4        SEND_VAR                                                 !1
          5        DO_ICALL                                                 
    8     6        ASSIGN                                                   !2, <array>
   12     7        INIT_FCALL                                               'password_hash'
          8        SEND_VAR                                                 !0
          9        SEND_VAL                                                 '2y'
         10        INIT_ARRAY                                       ~10     !4, 'salt'
         11        SEND_VAL                                                 ~10
         12        DO_ICALL                                         $11     
         13        ASSIGN                                                   !3, $11
   13    14        INIT_FCALL                                               'password_hash'
         15        SEND_VAR                                                 !1
         16        SEND_VAL                                                 '2y'
         17        INIT_ARRAY                                       ~13     !4, 'salt'
         18        SEND_VAL                                                 ~13
         19        DO_ICALL                                         $14     
         20        ASSIGN                                                   !5, $14
   15    21        INIT_FCALL                                               'var_dump'
         22        SEND_VAR                                                 !3
         23        SEND_VAR                                                 !5
         24        DO_ICALL                                                 
   16    25        INIT_FCALL                                               'var_dump'
         26        IS_IDENTICAL                                     ~17     !3, !5
         27        SEND_VAL                                                 ~17
         28        DO_ICALL                                                 
         29      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
152.45 ms | 1396 KiB | 17 Q