3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo "test011011"; $hash = '$2a$04$IlHCuJ9dZ1fUMEVqfOqrK.HnJNfOF.ZtMf9/FvUboDF191m9.hCYy'; if (password_verify('rasmuslerdor', $hash)) { echo 'Password is valid!'; } else { echo 'Invalid password.'; } ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 9
Branch analysis from position: 7
1 jumps found. (Code = 42) Position 1 = 10
Branch analysis from position: 10
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 9
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/Z281RB
function name:  (null)
number of ops:  11
compiled vars:  !0 = $hash
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ECHO                                                     'test011011'
    3     1        ASSIGN                                                   !0, '%242a%2404%24IlHCuJ9dZ1fUMEVqfOqrK.HnJNfOF.ZtMf9%2FFvUboDF191m9.hCYy'
    5     2        INIT_FCALL                                               'password_verify'
          3        SEND_VAL                                                 'rasmuslerdor'
          4        SEND_VAR                                                 !0
          5        DO_ICALL                                         $2      
          6      > JMPZ                                                     $2, ->9
    6     7    >   ECHO                                                     'Password+is+valid%21'
          8      > JMP                                                      ->10
    8     9    >   ECHO                                                     'Invalid+password.'
   10    10    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
157.87 ms | 1394 KiB | 15 Q