PHP:
скопировать код в буфер обмена
скопировать код в буфер обмена
- function encrypt($decrypted, $password="123", $salt='!kQm*fF3pXe1Kbm%9') {
- // Build a 256-bit $key which is a SHA256 hash of $salt and $password.
- // Build $iv and $iv_base64. We use a block size of 128 bits (AES compliant) and CBC mode. (Note: ECB mode is inadequate as IV is not used.)
- srand(); $iv = mcrypt_create_iv(mcrypt_get_iv_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC), MCRYPT_RAND);
- // Encrypt $decrypted and an MD5 of $decrypted using $key. MD5 is fine to use here because it's just to verify successful decryption.
- $encrypted = base64_encode(mcrypt_encrypt(MCRYPT_RIJNDAEL_128, $key, $decrypted . md5($decrypted), MCRYPT_MODE_CBC, $iv));
- // We're done!
- return $iv_base64 . $encrypted;
- }
- function decrypt($encrypted, $password="123", $salt='!kQm*fF3pXe1Kbm%9') {
- // Build a 256-bit $key which is a SHA256 hash of $salt and $password.
- // Retrieve $iv which is the first 22 characters plus ==, base64_decoded.
- // Remove $iv from $encrypted.
- // Decrypt the data. rtrim won't corrupt the data because the last 32 characters are the md5 hash; thus any \0 character has to be padding.
- $decrypted = rtrim(mcrypt_decrypt(MCRYPT_RIJNDAEL_128, $key, base64_decode($encrypted), MCRYPT_MODE_CBC, $iv), "\0\4");
- // Retrieve $hash which is the last 32 characters of $decrypted.
- // Remove the last 32 characters from $decrypted.
- // Integrity check. If this fails, either the data is corrupted, or the password/salt was incorrect.
- //if (md5($decrypted) != $hash) return false;
- // Yay!
- return $decrypted;
- }
- print $a;