3v4l.org

run code in 300+ PHP versions simultaneously
<?php $passwordClear = '@hiscene2014'; $cryptedPassword = '{MD5}' . base64_encode( pack( 'H*' , md5( $passwordClear) ) ); echo $cryptedPassword;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/XScp4
function name:  (null)
number of ops:  15
compiled vars:  !0 = $passwordClear, !1 = $cryptedPassword
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%40hiscene2014'
    3     1        INIT_FCALL                                               'base64_encode'
          2        INIT_FCALL                                               'pack'
          3        SEND_VAL                                                 'H%2A'
          4        INIT_FCALL                                               'md5'
          5        SEND_VAR                                                 !0
          6        DO_ICALL                                         $3      
          7        SEND_VAR                                                 $3
          8        DO_ICALL                                         $4      
          9        SEND_VAR                                                 $4
         10        DO_ICALL                                         $5      
         11        CONCAT                                           ~6      '%7BMD5%7D', $5
         12        ASSIGN                                                   !1, ~6
    5    13        ECHO                                                     !1
         14      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
161.82 ms | 1394 KiB | 19 Q