3v4l.org

run code in 500+ PHP versions simultaneously
<?php $pass = 'secret'; $salt = '$2y$07$usesomesillystringforsaltzzzzzzzzzzzzz$'; var_dump( CRYPT_SALT_LENGTH, crypt($pass, $salt));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/dvgnq
function name:  (null)
number of ops:  11
compiled vars:  !0 = $pass, !1 = $salt
line      #* E I O op                               fetch          ext  return  operands
-----------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                       !0, 'secret'
    4     1        ASSIGN                                                       !1, '%242y%2407%24usesomesillystringforsaltzzzzzzzzzzzzz%24'
    6     2        INIT_FCALL                                                   'var_dump'
          3        SEND_VAL                                                     123
          4        INIT_FCALL                                                   'crypt'
          5        SEND_VAR                                                     !0
          6        SEND_VAR                                                     !1
          7        DO_ICALL                                             $4      
          8        SEND_VAR                                                     $4
          9        DO_ICALL                                                     
         10      > RETURN                                                       1

Generated using Vulcan Logic Dumper, using php 8.5.0


preferences:
176.59 ms | 3323 KiB | 15 Q