3v4l.org

run code in 300+ PHP versions simultaneously
<?php // 2 character salt if (CRYPT_STD_DES == 1) { echo "Standard DES: ".crypt('something','st')."\n<br>"; } else { echo "Standard DES not supported.\n<br>"; } // 4 character salt if (CRYPT_EXT_DES == 1) { echo "Extended DES: ".crypt('something','_S4..some')."\n<br>"; } else { echo "Extended DES not supported.\n<br>"; } // 12 character salt starting with $1$ if (CRYPT_MD5 == 1) { echo "MD5: ".crypt('something','$1$somethin$')."\n<br>"; } else { echo "MD5 not supported.\n<br>"; } // Salt starting with $2a$. The two digit cost parameter: 09. 22 characters if (CRYPT_BLOWFISH == 1) { echo "Blowfish: ".crypt('something','$2a$09$anexamplestringforsalt$')."\n<br>"; } else { echo "Blowfish DES not supported.\n<br>"; } // 16 character salt starting with $5$. The default number of rounds is 5000. if (CRYPT_SHA256 == 1) { echo "SHA-256: ".crypt('something','$5$rounds=5000$anexamplestringforsalt$')."\n<br>"; } else { echo "SHA-256 not supported.\n<br>"; } // 16 character salt starting with $5$. The default number of rounds is 5000. if (CRYPT_SHA512 == 1) { echo "SHA-512: ".crypt('something','$6$rounds=5000$anexamplestringforsalt$'); } else { echo "SHA-512 not supported."; } ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 9
Branch analysis from position: 1
1 jumps found. (Code = 42) Position 1 = 10
Branch analysis from position: 10
2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 19
Branch analysis from position: 11
1 jumps found. (Code = 42) Position 1 = 20
Branch analysis from position: 20
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 29
Branch analysis from position: 21
1 jumps found. (Code = 42) Position 1 = 30
Branch analysis from position: 30
2 jumps found. (Code = 43) Position 1 = 31, Position 2 = 39
Branch analysis from position: 31
1 jumps found. (Code = 42) Position 1 = 40
Branch analysis from position: 40
2 jumps found. (Code = 43) Position 1 = 41, Position 2 = 49
Branch analysis from position: 41
1 jumps found. (Code = 42) Position 1 = 50
Branch analysis from position: 50
2 jumps found. (Code = 43) Position 1 = 51, Position 2 = 58
Branch analysis from position: 51
1 jumps found. (Code = 42) Position 1 = 59
Branch analysis from position: 59
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 58
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 49
2 jumps found. (Code = 43) Position 1 = 51, Position 2 = 58
Branch analysis from position: 51
Branch analysis from position: 58
Branch analysis from position: 39
2 jumps found. (Code = 43) Position 1 = 41, Position 2 = 49
Branch analysis from position: 41
Branch analysis from position: 49
Branch analysis from position: 29
2 jumps found. (Code = 43) Position 1 = 31, Position 2 = 39
Branch analysis from position: 31
Branch analysis from position: 39
Branch analysis from position: 19
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 29
Branch analysis from position: 21
Branch analysis from position: 29
Branch analysis from position: 9
2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 19
Branch analysis from position: 11
Branch analysis from position: 19
filename:       /in/qkXkh
function name:  (null)
number of ops:  60
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E > > JMPZ                                                     <true>, ->9
    5     1    >   INIT_FCALL                                               'crypt'
          2        SEND_VAL                                                 'something'
          3        SEND_VAL                                                 'st'
          4        DO_ICALL                                         $0      
          5        CONCAT                                           ~1      'Standard+DES%3A+', $0
          6        CONCAT                                           ~2      ~1, '%0A%3Cbr%3E'
          7        ECHO                                                     ~2
          8      > JMP                                                      ->10
    9     9    >   ECHO                                                     'Standard+DES+not+supported.%0A%3Cbr%3E'
   13    10    > > JMPZ                                                     <true>, ->19
   15    11    >   INIT_FCALL                                               'crypt'
         12        SEND_VAL                                                 'something'
         13        SEND_VAL                                                 '_S4..some'
         14        DO_ICALL                                         $3      
         15        CONCAT                                           ~4      'Extended+DES%3A+', $3
         16        CONCAT                                           ~5      ~4, '%0A%3Cbr%3E'
         17        ECHO                                                     ~5
         18      > JMP                                                      ->20
   19    19    >   ECHO                                                     'Extended+DES+not+supported.%0A%3Cbr%3E'
   23    20    > > JMPZ                                                     <true>, ->29
   25    21    >   INIT_FCALL                                               'crypt'
         22        SEND_VAL                                                 'something'
         23        SEND_VAL                                                 '%241%24somethin%24'
         24        DO_ICALL                                         $6      
         25        CONCAT                                           ~7      'MD5%3A+', $6
         26        CONCAT                                           ~8      ~7, '%0A%3Cbr%3E'
         27        ECHO                                                     ~8
         28      > JMP                                                      ->30
   29    29    >   ECHO                                                     'MD5+not+supported.%0A%3Cbr%3E'
   33    30    > > JMPZ                                                     <true>, ->39
   35    31    >   INIT_FCALL                                               'crypt'
         32        SEND_VAL                                                 'something'
         33        SEND_VAL                                                 '%242a%2409%24anexamplestringforsalt%24'
         34        DO_ICALL                                         $9      
         35        CONCAT                                           ~10     'Blowfish%3A+', $9
         36        CONCAT                                           ~11     ~10, '%0A%3Cbr%3E'
         37        ECHO                                                     ~11
         38      > JMP                                                      ->40
   39    39    >   ECHO                                                     'Blowfish+DES+not+supported.%0A%3Cbr%3E'
   43    40    > > JMPZ                                                     <true>, ->49
   45    41    >   INIT_FCALL                                               'crypt'
         42        SEND_VAL                                                 'something'
         43        SEND_VAL                                                 '%245%24rounds%3D5000%24anexamplestringforsalt%24'
         44        DO_ICALL                                         $12     
         45        CONCAT                                           ~13     'SHA-256%3A+', $12
         46        CONCAT                                           ~14     ~13, '%0A%3Cbr%3E'
         47        ECHO                                                     ~14
         48      > JMP                                                      ->50
   48    49    >   ECHO                                                     'SHA-256+not+supported.%0A%3Cbr%3E'
   52    50    > > JMPZ                                                     <true>, ->58
   54    51    >   INIT_FCALL                                               'crypt'
         52        SEND_VAL                                                 'something'
         53        SEND_VAL                                                 '%246%24rounds%3D5000%24anexamplestringforsalt%24'
         54        DO_ICALL                                         $15     
         55        CONCAT                                           ~16     'SHA-512%3A+', $15
         56        ECHO                                                     ~16
         57      > JMP                                                      ->59
   58    58    >   ECHO                                                     'SHA-512+not+supported.'
   60    59    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
154 ms | 1400 KiB | 15 Q