3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo 'Blowfish: ' . crypt('rasmuslerdorf', '$2a$07$usesomesillystringforsalt$') . "\n";
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/o78vN
function name:  (null)
number of ops:  8
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'crypt'
          1        SEND_VAL                                                 'rasmuslerdorf'
          2        SEND_VAL                                                 '%242a%2407%24usesomesillystringforsalt%24'
          3        DO_ICALL                                         $0      
          4        CONCAT                                           ~1      'Blowfish%3A+++++', $0
          5        CONCAT                                           ~2      ~1, '%0A'
          6        ECHO                                                     ~2
          7      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
155.88 ms | 1393 KiB | 15 Q