????JFIF??x?x????'
Server IP : 79.136.114.73 / Your IP : 3.14.72.80 Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 User : www-data ( 33) PHP Version : 5.5.9-1ubuntu4.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /proc/self/root/home/b8009/php-5.6.22/ext/mcrypt/tests/ |
Upload File : |
--TEST-- Test mcrypt_decrypt() function : basic functionality --SKIPIF-- <?php if (!extension_loaded("mcrypt")) { print "skip - mcrypt extension not loaded"; } ?> --FILE-- <?php /* Prototype : string mcrypt_decrypt(string cipher, string key, string data, string mode, string iv) * Description: OFB crypt/decrypt data using key key with cipher cipher starting with iv * Source code: ext/mcrypt/mcrypt.c * Alias to functions: */ echo "*** Testing mcrypt_decrypt() : basic functionality ***\n"; // Initialise all required variables $cipher = MCRYPT_3DES; $mode = MCRYPT_MODE_CBC; // tripledes uses keys with exactly 192 bits (24 bytes) $keys = array( b'12345678', b'12345678901234567890', b'123456789012345678901234', b'12345678901234567890123456' ); $data1 = array( 'IleMhoxiOthmHua4tFBHOw==', 'EeF1s6C+w1IiHj1gdDn81g==', 'EEuXpjZPueyYoG0LGQ199Q==', 'EEuXpjZPueyYoG0LGQ199Q==' ); // tripledes is a block cipher of 64 bits (8 bytes) $ivs = array( b'1234', b'12345678', b'123456789' ); $data2 = array( '+G7nGcWIxij3TZjpI9lJdQ==', '3bJiFMeyScxOLQcE6mZtLg==', '+G7nGcWIxij3TZjpI9lJdQ==' ); $iv = b'12345678'; echo "\n--- testing different key lengths\n"; for ($i = 0; $i < sizeof($keys); $i++) { echo "\nkey length=".strlen($keys[$i])."\n"; special_var_dump(mcrypt_decrypt($cipher, $keys[$i], base64_decode($data1[$i]), $mode, $iv)); } $key = b'123456789012345678901234'; echo "\n--- testing different iv lengths\n"; for ($i = 0; $i < sizeof($ivs); $i++) { echo "\niv length=".strlen($ivs[$i])."\n"; special_var_dump(mcrypt_decrypt($cipher, $key, base64_decode($data2[$i]), $mode, $ivs[$i])); } function special_var_dump($str) { var_dump(bin2hex($str)); } ?> ===DONE=== --EXPECTF-- *** Testing mcrypt_decrypt() : basic functionality *** --- testing different key lengths key length=8 Warning: mcrypt_decrypt(): Key of size 8 not supported by this algorithm. Only keys of size 24 supported in %s on line %d string(0) "" key length=20 Warning: mcrypt_decrypt(): Key of size 20 not supported by this algorithm. Only keys of size 24 supported in %s on line %d string(0) "" key length=24 string(32) "736563726574206d6573736167650000" key length=26 Warning: mcrypt_decrypt(): Key of size 26 not supported by this algorithm. Only keys of size 24 supported in %s on line %d string(0) "" --- testing different iv lengths iv length=4 Warning: mcrypt_decrypt(): Received initialization vector of size 4, but size 8 is required for this encryption mode in %s on line %d string(0) "" iv length=8 string(32) "659ec947f4dc3a3b9c50de744598d3c8" iv length=9 Warning: mcrypt_decrypt(): Received initialization vector of size 9, but size 8 is required for this encryption mode in %s on line %d string(0) "" ===DONE===