3v4l.org

run code in 300+ PHP versions simultaneously
<?php $salt = substr(md5('static salt'), 0, 21); echo "SALT: " . $salt . PHP_EOL; for ($i = 0; $i < 5; $i++) { echo "PASSWORD HASH: " . password_hash('reddit is fun', PASSWORD_DEFAULT, ['salt' => $salt, 'cost' => 4]) . PHP_EOL; } if (CRYPT_BLOWFISH == 1) { for ($i = 0; $i < 5; $i++) { echo "CRYPT BLOWFISH: " . crypt('reddit is fun', '$2a$04$' . $salt . '$') . PHP_EOL; } }
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 42) Position 1 = 25
Branch analysis from position: 25
2 jumps found. (Code = 44) Position 1 = 27, Position 2 = 14
Branch analysis from position: 27
2 jumps found. (Code = 43) Position 1 = 28, Position 2 = 42
Branch analysis from position: 28
1 jumps found. (Code = 42) Position 1 = 40
Branch analysis from position: 40
2 jumps found. (Code = 44) Position 1 = 42, Position 2 = 30
Branch analysis from position: 42
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 30
2 jumps found. (Code = 44) Position 1 = 42, Position 2 = 30
Branch analysis from position: 42
Branch analysis from position: 30
Branch analysis from position: 42
Branch analysis from position: 14
2 jumps found. (Code = 44) Position 1 = 27, Position 2 = 14
Branch analysis from position: 27
Branch analysis from position: 14
filename:       /in/ljSJS
function name:  (null)
number of ops:  43
compiled vars:  !0 = $salt, !1 = $i
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'substr'
          1        INIT_FCALL                                               'md5'
          2        SEND_VAL                                                 'static+salt'
          3        DO_ICALL                                         $2      
          4        SEND_VAR                                                 $2
          5        SEND_VAL                                                 0
          6        SEND_VAL                                                 21
          7        DO_ICALL                                         $3      
          8        ASSIGN                                                   !0, $3
    5     9        CONCAT                                           ~5      'SALT%3A+', !0
         10        CONCAT                                           ~6      ~5, '%0A'
         11        ECHO                                                     ~6
    7    12        ASSIGN                                                   !1, 0
         13      > JMP                                                      ->25
    8    14    >   INIT_FCALL                                               'password_hash'
         15        SEND_VAL                                                 'reddit+is+fun'
         16        SEND_VAL                                                 '2y'
         17        INIT_ARRAY                                       ~8      !0, 'salt'
         18        ADD_ARRAY_ELEMENT                                ~8      4, 'cost'
         19        SEND_VAL                                                 ~8
         20        DO_ICALL                                         $9      
         21        CONCAT                                           ~10     'PASSWORD+HASH%3A+', $9
         22        CONCAT                                           ~11     ~10, '%0A'
         23        ECHO                                                     ~11
    7    24        PRE_INC                                                  !1
         25    >   IS_SMALLER                                               !1, 5
         26      > JMPNZ                                                    ~13, ->14
   11    27    > > JMPZ                                                     <true>, ->42
   12    28    >   ASSIGN                                                   !1, 0
         29      > JMP                                                      ->40
   13    30    >   INIT_FCALL                                               'crypt'
         31        SEND_VAL                                                 'reddit+is+fun'
         32        CONCAT                                           ~15     '%242a%2404%24', !0
         33        CONCAT                                           ~16     ~15, '%24'
         34        SEND_VAL                                                 ~16
         35        DO_ICALL                                         $17     
         36        CONCAT                                           ~18     'CRYPT+BLOWFISH%3A+', $17
         37        CONCAT                                           ~19     ~18, '%0A'
         38        ECHO                                                     ~19
   12    39        PRE_INC                                                  !1
         40    >   IS_SMALLER                                               !1, 5
         41      > JMPNZ                                                    ~21, ->30
   15    42    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
152.33 ms | 1400 KiB | 21 Q