3v4l.org

run code in 200+ php & hhvm versions
Bugs & Features
<?php class Foo { protected $mcrypt_cipher = MCRYPT_RIJNDAEL_128; protected $mcrypt_mode = MCRYPT_MODE_CBC; public function decrypt($key, $iv, $encrypted) { return mcrypt_decrypt($this->mcrypt_cipher, $key, base64_decode($encrypted), $this->mcrypt_mode, $iv); } public function encrypt($key, $iv, $password) { $block = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_ECB); $padding = $block - (strlen($password) % $block); $password .= str_repeat(chr($padding), $padding); return mcrypt_encrypt($this->mcrypt_cipher, $key, $password, $this->mcrypt_mode, $iv); } } $foo = new Foo; $pass = 'ICS2015'; $salt = '7'; $key = PBKDF1($pass, $salt, 100, 32); $iv = PBKDF1($pass, $salt, 100, 16); $encrypted = $foo->encrypt($key,$iv,'boy10@naver.com'); $encrypted = base64_encode($encrypted); echo 'Encrypted: '.$encrypted.'</br>'; echo 'Decrypted: '.$foo->decrypt($key, $iv, $encrypted); function PBKDF1($pass, $salt, $count, $cb) { static $base; static $extra; static $extracount= 0; static $hashno; static $state = 0; if ($state == 0) { $hashno = 0; $state = 1; $key = $pass . $salt; $base = sha1($key, true); for($i = 2; $i < $count; $i++) { $base = sha1($base, true); } } $result = ""; if ($extracount > 0) { $rlen = strlen($extra) - $extracount; if ($rlen >= $cb) { $result = substr($extra, $extracount, $cb); if ($rlen > $cb) { $extracount += $cb; } else { $extra = null; $extracount = 0; } return $result; } $result = substr($extra, $rlen, $rlen); } $current = ""; $clen = 0; $remain = $cb - strlen($result); while ($remain > $clen) { if ($hashno == 0) { $current = sha1($base, true); } else if ($hashno < 1000) { $n = sprintf("%d", $hashno); $tmp = $n . $base; $current .= sha1($tmp, true); } $hashno++; $clen = strlen($current); } // $current now holds at least as many bytes as we need $result .= substr($current, 0, $remain); // Save any left over bytes for any future requests if ($clen > $remain) { $extra = $current; $extracount = $remain; } return $result; }
based on ho0jH
Output for 7.2.0
Warning: Use of undefined constant MCRYPT_RIJNDAEL_128 - assumed 'MCRYPT_RIJNDAEL_128' (this will throw an Error in a future version of PHP) in /in/WOcbm on line 21 Warning: Use of undefined constant MCRYPT_MODE_CBC - assumed 'MCRYPT_MODE_CBC' (this will throw an Error in a future version of PHP) in /in/WOcbm on line 21 Fatal error: Uncaught Error: Call to undefined function mcrypt_get_block_size() in /in/WOcbm:13 Stack trace: #0 /in/WOcbm(29): Foo->encrypt('\x96\xAF\xA7I,\xFEO\xC0\x05i\xEF\xCAK\xC6\xB3...', '\x05i\xEF\xCAK\xC6\xB3\xF2\xB0\x98\xD9\xBEAw\x1F...', 'boy10@naver.com') #1 {main} thrown in /in/WOcbm on line 13
Process exited with code 255.
Output for 7.0.6 - 7.1.10
Notice: Use of undefined constant MCRYPT_RIJNDAEL_128 - assumed 'MCRYPT_RIJNDAEL_128' in /in/WOcbm on line 21 Notice: Use of undefined constant MCRYPT_MODE_CBC - assumed 'MCRYPT_MODE_CBC' in /in/WOcbm on line 21 Fatal error: Uncaught Error: Call to undefined function mcrypt_get_block_size() in /in/WOcbm:13 Stack trace: #0 /in/WOcbm(29): Foo->encrypt('\x96\xAF\xA7I,\xFEO\xC0\x05i\xEF\xCAK\xC6\xB3...', '\x05i\xEF\xCAK\xC6\xB3\xF2\xB0\x98\xD9\xBEAw\x1F...', 'boy10@naver.com') #1 {main} thrown in /in/WOcbm on line 13
Process exited with code 255.
Output for 5.4.10 - 5.5.34, 5.6.8 - 5.6.20, 7.0.0 - 7.0.5
Encrypted: kM1e0IeYdW0kxisulAbTlA==</br>Decrypted: boy10@naver.com
Output for 5.3.20 - 5.3.29, 5.5.35, 5.6.21 - 5.6.28
Notice: Use of undefined constant MCRYPT_RIJNDAEL_128 - assumed 'MCRYPT_RIJNDAEL_128' in /in/WOcbm on line 21 Notice: Use of undefined constant MCRYPT_MODE_CBC - assumed 'MCRYPT_MODE_CBC' in /in/WOcbm on line 21 Fatal error: Call to undefined function mcrypt_get_block_size() in /in/WOcbm on line 13
Process exited with code 255.