3v4l.org

run code in 300+ PHP versions simultaneously
<?php $my_password_hash = '098f6bcd4621d373cade4e832627b4f6'; echo md5('ximaz') . "\n"; echo $my_password_hash . "\n"; var_dump(md5('ximaz')==$my_password_hash);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/X3CQA
function name:  (null)
number of ops:  16
compiled vars:  !0 = $my_password_hash
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '098f6bcd4621d373cade4e832627b4f6'
    5     1        INIT_FCALL                                               'md5'
          2        SEND_VAL                                                 'ximaz'
          3        DO_ICALL                                         $2      
          4        CONCAT                                           ~3      $2, '%0A'
          5        ECHO                                                     ~3
    6     6        CONCAT                                           ~4      !0, '%0A'
          7        ECHO                                                     ~4
    7     8        INIT_FCALL                                               'var_dump'
          9        INIT_FCALL                                               'md5'
         10        SEND_VAL                                                 'ximaz'
         11        DO_ICALL                                         $5      
         12        IS_EQUAL                                         ~6      !0, $5
         13        SEND_VAL                                                 ~6
         14        DO_ICALL                                                 
         15      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
158.89 ms | 1394 KiB | 17 Q