百科狗-知识改变命运!
--

mcrypt_decrypt() - mcrypt库(加密)

是丫丫呀12个月前 (11-21)阅读数 33#技术干货
文章标签长度

mcrypt_decrypt()

mcrypt_decrypt() - mcrypt库(加密)

(PHP 4 >= 4.0.2, PHP 5, PHP 7 = 1.0.0)

使用给定参数解密密文

Warning

This function has beenDEPRECATEDas of PHP 7.1.0 andREMOVEDas of PHP 7.2.0. Relying on this functionis highly discouraged.

说明

mcrypt_decrypt(string $cipher,string $key,string $data,string $mode[,string $iv]): string

解密$data并返回明文。

参数

$cipher

MCRYPT_ciphername常量中的一个,或者是字符串值的算法名称。

$key

数据加密密钥。如果密钥长度不是加解密算法能够支持的有效长度,那么会产生警告并且返回FALSE

$data

要使用给定的$cipher和$mode解密的数据。如果数据大小不是 n *分组大小,则在其后追加'0'来补齐。

$mode

MCRYPT_MODE_modename常量中的一个,或以下字符串中的一个:"ecb","cbc","cfb","ofb","nofb"和"stream"。

$iv

Used for the initialization in CBC, CFB, OFB modes, and in some algorithms in STREAM mode. If the provided IV size is not supported by the chaining mode or no IV was provided, but the chaining mode requires one, the function will emit a warning and return FALSE.

返回值

以字符串格式返回解密后的数据,或者在失败时返回FALSE

更新日志

版本说明
5.6.0不再接受无效长度的$keyand$iv参数。如果参数长度无效,则mcrypt_decrypt()函数会产生警告并且返回FALSE。之前版本中,对于长度不足的密钥和初始向量会在其后补齐'0'使其达到有效长度。

参见

  • mcrypt_encrypt()使用给定参数加密明文
It appears that mcrypt_decrypt pads the *RETURN STRING* with nulls ('\0') to fill out to n * blocksize. For old C-programmers, like myself, it is easy to believe the string ends at the first null. In PHP it does not:
  strlen("abc\0\0") returns 5 and *NOT* 3
  strcmp("abc", "abc\0\0") returns -2 and *NOT* 0
I learned this lesson painfully when I passed a string returned from mycrypt_decrypt into a NuSoap message, which happily passed the nulls along to the receiver, who couldn't figure out what I was talking about.
My solution was: 
Look at http://php.net/manual/en/function.openssl-decrypt.php for a replacement. 
Supports PHP 5 >= 5.3.0, PHP 7
When i using this function i find some problem, with adding additional binary symbols in decode message. 
$sDecrypt – «2433091»
$sDecrypt strlen – 16 (before trim) 
$sDecrypt – «2433091»
$sDecrypt strlen – 7 (after trim)
At local PC this problem solved by using trim/trim, but if I send my encrypt message to sever, and try encrypt them, I see that my message is not 16 symbols, as it was in my local pc, it is 32 sybmols, after encode. And trim function not working. I look at symbols code and what I see 
  50
  52
  51
  51
  48
  57
  49
  0
  0
  0
  0
  0
  0
  0
  0
  0
  10
  158
  112
  183
  154
  27
  95
  85
  42
  35
  95
  54
  227
  41
  179
  77
After “tabulation symbols” I get some junk symbols, and I solve this problems like this.
After mcrypt_decrypt I use this code 
$plaintext_dec = substr($plaintext_dec, 0, strpos($plaintext_dec, "\0"));
I think it is not best resolution for this problem, but I solve my problem :)
If you happen to be decrypting something encrypted in ColdFusion, you'll discover that its encrypt function apparently pads the plaintext with ASCII 4, the "end of transmission" character.
Building on eddiec's code, you can remove both nulls and EOTs with this: 
Caution, MCRYPT_RIJNDAEL_256 is not equivalent to AES_256.
The way to make RIJNDAEL be decrypted from AES with openssl is to use MCRYPT_RIJNDAEL_128 and padd the string to encrypt before encrypting with the follwing function:

On the decryption, the choosing of AES_256 or AES_128, etc. is based on the keysize used in the crypting. In my case it was a 128bit key so I used AES_128.
Be careful, sometimes mcrypt_decrypt return additional white spaces to the uncrypted string; use trim() for deleting them. I was like 2 hours searching the error and it was that..
To remove PKCS7 padding: 
To decrypt data coming from MySQL's AES_ENCRYPT function:

adapted from the article "Replicating MySQL AES Encryption Methods With PHP" (dated 2012-05-20) found somewhere online.

鹏仔微信 15129739599 鹏仔QQ344225443 鹏仔前端 pjxi.com 共享博客 sharedbk.com

免责声明:我们致力于保护作者版权,注重分享,当前被刊用文章因无法核实真实出处,未能及时与作者取得联系,或有版权异议的,请联系管理员,我们会立即处理! 部分文章是来自自研大数据AI进行生成,内容摘自(百度百科,百度知道,头条百科,中国民法典,刑法,牛津词典,新华词典,汉语词典,国家院校,科普平台)等数据,内容仅供学习参考,不准确地方联系删除处理!邮箱:344225443@qq.com)

图片声明:本站部分配图来自网络。本站只作为美观性配图使用,无任何非法侵犯第三方意图,一切解释权归图片著作权方,本站不承担任何责任。如有恶意碰瓷者,必当奉陪到底严惩不贷!

内容声明:本文中引用的各种信息及资料(包括但不限于文字、数据、图表及超链接等)均来源于该信息及资料的相关主体(包括但不限于公司、媒体、协会等机构)的官方网站或公开发表的信息。部分内容参考包括:(百度百科,百度知道,头条百科,中国民法典,刑法,牛津词典,新华词典,汉语词典,国家院校,科普平台)等数据,内容仅供参考使用,不准确地方联系删除处理!本站为非盈利性质站点,本着为中国教育事业出一份力,发布内容不收取任何费用也不接任何广告!)