3v4l.org

run code in 300+ PHP versions simultaneously
<?php // パスワードは'GoemonLets5'です // $hashにはパスワードのhash値が入ってます if (password_verify('GoemonLets5shinai', $hash)) { echo 'パスワードが一致したよ!' . "\n"; } else { echo 'パスワードが一致してないよ!' . "\n"; } if (password_verify('GoemonLets5', $hash)) { echo 'パスワードが一致したよ!' . "\n"; } else { echo 'パスワードが一致してないよ!' . "\n"; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 5, Position 2 = 7
Branch analysis from position: 5
1 jumps found. (Code = 42) Position 1 = 8
Branch analysis from position: 8
2 jumps found. (Code = 43) Position 1 = 13, Position 2 = 15
Branch analysis from position: 13
1 jumps found. (Code = 42) Position 1 = 16
Branch analysis from position: 16
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 15
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 7
2 jumps found. (Code = 43) Position 1 = 13, Position 2 = 15
Branch analysis from position: 13
Branch analysis from position: 15
filename:       /in/Wa07B
function name:  (null)
number of ops:  17
compiled vars:  !0 = $hash
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    6     0  E >   INIT_FCALL                                               'password_verify'
          1        SEND_VAL                                                 'GoemonLets5shinai'
          2        SEND_VAR                                                 !0
          3        DO_ICALL                                         $1      
          4      > JMPZ                                                     $1, ->7
    7     5    >   ECHO                                                     '%E3%83%91%E3%82%B9%E3%83%AF%E3%83%BC%E3%83%89%E3%81%8C%E4%B8%80%E8%87%B4%E3%81%97%E3%81%9F%E3%82%88%EF%BC%81%0A'
          6      > JMP                                                      ->8
    9     7    >   ECHO                                                     '%E3%83%91%E3%82%B9%E3%83%AF%E3%83%BC%E3%83%89%E3%81%8C%E4%B8%80%E8%87%B4%E3%81%97%E3%81%A6%E3%81%AA%E3%81%84%E3%82%88%EF%BC%81%0A'
   12     8    >   INIT_FCALL                                               'password_verify'
          9        SEND_VAL                                                 'GoemonLets5'
         10        SEND_VAR                                                 !0
         11        DO_ICALL                                         $2      
         12      > JMPZ                                                     $2, ->15
   13    13    >   ECHO                                                     '%E3%83%91%E3%82%B9%E3%83%AF%E3%83%BC%E3%83%89%E3%81%8C%E4%B8%80%E8%87%B4%E3%81%97%E3%81%9F%E3%82%88%EF%BC%81%0A'
         14      > JMP                                                      ->16
   15    15    >   ECHO                                                     '%E3%83%91%E3%82%B9%E3%83%AF%E3%83%BC%E3%83%89%E3%81%8C%E4%B8%80%E8%87%B4%E3%81%97%E3%81%A6%E3%81%AA%E3%81%84%E3%82%88%EF%BC%81%0A'
   16    16    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
151.98 ms | 1395 KiB | 15 Q