3v4l.org

run code in 150+ php & hhvm versions
Bugs & Features
<?php $salt20 = '12345678901234567890'; $pw = 'test'; // see if Blowfish hashing is possible var_dump(CRYPT_BLOWFISH); echo "Hash with salt20: " . crypt($pw, '$2a$11$' . $salt20) . "\n"; echo "Hash with salt21: " . crypt($pw, '$2a$11$x' . $salt20) . "\n"; echo "Hash with salt22: " . crypt($pw, '$2a$11$xy' . $salt20) . "\n"; echo "Hash with salt23: " . crypt($pw, '$2a$11$xyz' . $salt20) . "\n";
Output for 5.5.0 - 7.1.0
int(1) Hash with salt20: *0 Hash with salt21: *0 Hash with salt22: $2a$11$xy1234567890123456789uUGWvzprkfSZicG0PhBtSK5UzC3n7g/i Hash with salt23: $2a$11$xyz123456789012345678uWEkwqDg/kw42gJyByIvxheqqUx8E4UO
Output for 5.3.0 - 5.4.45
int(1) Hash with salt20: $2a$11$12345678901234567890$.sTHQ7O4gHgO7alM/cri4fhJvojMP3v2 Hash with salt21: $2a$11$x12345678901234567890.2CYfZ3UUxkaqHY9XWQ.UEKooJv0TT7S Hash with salt22: $2a$11$xy1234567890123456789uUGWvzprkfSZicG0PhBtSK5UzC3n7g/i Hash with salt23: $2a$11$xyz123456789012345678uWEkwqDg/kw42gJyByIvxheqqUx8E4UO
Output for 4.3.0 - 5.2.17
int(0)
Process exited with code 139.