Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

mdecrypt_generic(3) [php man page]

MDECRYPT_GENERIC(3)							 1						       MDECRYPT_GENERIC(3)

mdecrypt_generic - Decrypts data

SYNOPSIS
string mdecrypt_generic (resource $td, string $data) DESCRIPTION
This function decrypts data. Note that the length of the returned string can in fact be longer than the unencrypted string, due to the padding of the data. PARAMETERS
o $td - An encryption descriptor returned by mcrypt_module_open(3) o $data - Encrypted data. EXAMPLES
Example #1 mdecrypt_generic(3) Example <?php /* Data */ $key = 'this is a very long key, even too long for the cipher'; $plain_text = 'very important data'; /* Open module, and create IV */ $td = mcrypt_module_open('des', '', 'ecb', ''); $key = substr($key, 0, mcrypt_enc_get_key_size($td)); $iv_size = mcrypt_enc_get_iv_size($td); $iv = mcrypt_create_iv($iv_size, MCRYPT_RAND); /* Initialize encryption handle */ if (mcrypt_generic_init($td, $key, $iv) != -1) { /* Encrypt data */ $c_t = mcrypt_generic($td, $plain_text); mcrypt_generic_deinit($td); /* Reinitialize buffers for decryption */ mcrypt_generic_init($td, $key, $iv); $p_t = mdecrypt_generic($td, $c_t); /* Clean up */ mcrypt_generic_deinit($td); mcrypt_module_close($td); } if (strncmp($p_t, $plain_text, strlen($plain_text)) == 0) { echo "ok "; } else { echo "error "; } ?> The example above shows how to check if the data before the encryption is the same as the data after the decryption. It is very important to reinitialize the encryption buffer with mcrypt_generic_init(3) before you try to decrypt the data. The decryption handle should always be initialized with mcrypt_generic_init(3) with a key and an IV before calling this function. Where the encryption is done, you should free the encryption buffers by calling mcrypt_generic_deinit(3). See mcrypt_module_open(3) for an exam- ple. SEE ALSO
mcrypt_generic(3), mcrypt_generic_init(3), mcrypt_generic_deinit(3). PHP Documentation Group MDECRYPT_GENERIC(3)

Check Out this Related Man Page

Image::ExifTool::AES(3pm)				User Contributed Perl Documentation				 Image::ExifTool::AES(3pm)

NAME
Image::ExifTool::AES - AES encryption with cipher-block chaining SYNOPSIS
use Image::ExifTool::AES qw(Crypt); $err = Crypt($plaintext, $key, 1); # encryption $err = Crypt($ciphertext, $key); # decryption DESCRIPTION
This module contains an implementation of the AES encryption/decryption algorithms with cipher-block chaining (CBC) and RFC 2898 PKCS #5 padding. This is the AESV2 and AESV3 encryption mode used in PDF documents. EXPORTS
Exports nothing by default, but "Crypt" may be exported. METHODS
Crypt Implement AES encryption/decryption with cipher-block chaining. Inputs: 0) Scalar reference for data to encrypt/decrypt. 1) Encryption key string (must have length 16, 24 or 32). 2) [optional] Encrypt flag (false to decrypt). 3) [optional] Flag to avoid removing padding after decrypting, or to avoid adding 16 bytes of padding before encrypting when data length is already a multiple of 16 bytes. Returns: On success, the return value is undefined and the data is encrypted or decrypted as specified. Otherwise returns an error string and the data is left in an indeterminate state. Notes: The length of the encryption key dictates the AES mode, with lengths of 16, 24 and 32 bytes resulting in AES-128, AES-192 and AES-256. When encrypting, the input data may be any length and will be padded to an even 16-byte block size using the specified padding technique. If the encrypt flag has length 16, it is used as the initialization vector for the cipher-block chaining, otherwise a random IV is generated. Upon successful return the data will be encrypted, with the first 16 bytes of the data being the CBC IV. When decrypting, the input data begins with the 16-byte CBC initialization vector. BUGS
This code is blindingly slow. But in truth, slowing down processing is the main purpose of encryption, so this really can't be considered a bug. AUTHOR
Copyright 2003-2011, Phil Harvey (phil at owl.phy.queensu.ca) This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. REFERENCES
<http://www.hoozi.com/Articles/AESEncryption.htm> http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf <http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf> <http://www.faqs.org/rfcs/rfc3602.html> SEE ALSO
Image::ExifTool(3pm) perl v5.12.4 2011-03-04 Image::ExifTool::AES(3pm)
Man Page