3v4l.org

run code in 300+ PHP versions simultaneously
<?php $foo = 'foo'; $bar = 'barbarbarbarbarbarbarbarbarbarba'; $p = 'password'; $s = 'abcdefghijklmnopqrstuvwxyz012345'; $h = crypt($p, '$2a$07$'.'usesomesillystringfor'.'$'); print $h."\n"; $h = crypt($s, '$2a$07$'.'usesomesillystringfor'.'$'); print $h."\n"; $h = crypt($p.$s, '$2a$07$'.'usesomesillystringfor'.'$'); print $h."\n"; $h = crypt($s.$p, '$2a$07$'.'usesomesillystringfor'.'$'); print $h."\n";
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/mh2tM
function name:  (null)
number of ops:  35
compiled vars:  !0 = $foo, !1 = $bar, !2 = $p, !3 = $s, !4 = $h
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'foo'
    4     1        ASSIGN                                                   !1, 'barbarbarbarbarbarbarbarbarbarba'
    6     2        ASSIGN                                                   !2, 'password'
    7     3        ASSIGN                                                   !3, 'abcdefghijklmnopqrstuvwxyz012345'
    9     4        INIT_FCALL                                               'crypt'
          5        SEND_VAR                                                 !2
          6        SEND_VAL                                                 '%242a%2407%24usesomesillystringfor%24'
          7        DO_ICALL                                         $9      
          8        ASSIGN                                                   !4, $9
   10     9        CONCAT                                           ~11     !4, '%0A'
         10        ECHO                                                     ~11
   11    11        INIT_FCALL                                               'crypt'
         12        SEND_VAR                                                 !3
         13        SEND_VAL                                                 '%242a%2407%24usesomesillystringfor%24'
         14        DO_ICALL                                         $12     
         15        ASSIGN                                                   !4, $12
   12    16        CONCAT                                           ~14     !4, '%0A'
         17        ECHO                                                     ~14
   13    18        INIT_FCALL                                               'crypt'
         19        CONCAT                                           ~15     !2, !3
         20        SEND_VAL                                                 ~15
         21        SEND_VAL                                                 '%242a%2407%24usesomesillystringfor%24'
         22        DO_ICALL                                         $16     
         23        ASSIGN                                                   !4, $16
   14    24        CONCAT                                           ~18     !4, '%0A'
         25        ECHO                                                     ~18
   15    26        INIT_FCALL                                               'crypt'
         27        CONCAT                                           ~19     !3, !2
         28        SEND_VAL                                                 ~19
         29        SEND_VAL                                                 '%242a%2407%24usesomesillystringfor%24'
         30        DO_ICALL                                         $20     
         31        ASSIGN                                                   !4, $20
   16    32        CONCAT                                           ~22     !4, '%0A'
         33        ECHO                                                     ~22
         34      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
152.81 ms | 1388 KiB | 15 Q