3v4l.org

run code in 300+ PHP versions simultaneously
<?php $salt = '$2a$07$usesomesillystringfore'; $result = crypt(md5('foobarbarbarbarbarbarbarbarbarbarba'),$salt); echo $result;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/Y9Kfc
function name:  (null)
number of ops:  11
compiled vars:  !0 = $salt, !1 = $result
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%242a%2407%24usesomesillystringfore'
    3     1        INIT_FCALL                                               'crypt'
          2        INIT_FCALL                                               'md5'
          3        SEND_VAL                                                 'foobarbarbarbarbarbarbarbarbarbarba'
          4        DO_ICALL                                         $3      
          5        SEND_VAR                                                 $3
          6        SEND_VAR                                                 !0
          7        DO_ICALL                                         $4      
          8        ASSIGN                                                   !1, $4
    4     9        ECHO                                                     !1
         10      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
149.91 ms | 1385 KiB | 17 Q