3v4l.org

run code in 300+ PHP versions simultaneously
<?php $password = crypt("My1sTpassword"); // let salt be generated /* Si dovrebbe passare l'intero risultato di crypt() come chiave di confronto della password per evitare problemi con differenti algoritmi di hash. (Come detto prima lo standard basato su DES usa chiavi di 2 caratteri, mentre lo standard basato su MD5 ne usa 12). */ if (crypt($user_input, $password) == $password) { echo "Password verified!"; } ?>
Output for 8.2.0 - 8.2.17, 8.3.0 - 8.3.4
Fatal error: Uncaught ArgumentCountError: crypt() expects exactly 2 arguments, 1 given in /in/iBVWf:3 Stack trace: #0 /in/iBVWf(3): crypt(Object(SensitiveParameterValue)) #1 {main} thrown in /in/iBVWf on line 3
Process exited with code 255.
Output for 8.0.0 - 8.0.30, 8.1.0 - 8.1.27
Fatal error: Uncaught ArgumentCountError: crypt() expects exactly 2 arguments, 1 given in /in/iBVWf:3 Stack trace: #0 /in/iBVWf(3): crypt('My1sTpassword') #1 {main} thrown in /in/iBVWf on line 3
Process exited with code 255.
Output for 5.6.0 - 5.6.28, 7.0.0 - 7.0.20, 7.1.0 - 7.1.20, 7.2.0 - 7.2.33, 7.3.12 - 7.3.31, 7.4.0 - 7.4.25, 7.4.27 - 7.4.33
Notice: crypt(): No salt parameter was specified. You must use a randomly generated salt and a strong hash function to produce a secure hash. in /in/iBVWf on line 3 Notice: Undefined variable: user_input in /in/iBVWf on line 9
Output for 4.3.0 - 4.3.11, 4.4.0 - 4.4.9, 5.0.0 - 5.0.5, 5.1.0 - 5.1.6, 5.2.0 - 5.2.17, 5.3.0 - 5.3.6, 5.3.8 - 5.3.29, 5.4.0 - 5.4.45, 7.3.32 - 7.3.33, 7.4.26
Output for 5.5.0 - 5.5.35
Notice: Undefined variable: user_input in /in/iBVWf on line 9
Output for 5.3.7
Password verified!

preferences:
193 ms | 401 KiB | 342 Q