![]() Server : Apache System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64 User : corals ( 1002) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /home/corals/cartforge.co/vendor/phpseclib/mcrypt_compat/ |
# mcrypt_compat [](https://github.com/phpseclib/mcrypt_compat/actions/workflows/ci.yml?query=branch%3A2.0) PHP 5.x-8.x polyfill for mcrypt extension. ## Supporting mcrypt_compat - [Become a backer or sponsor on Patreon](https://www.patreon.com/phpseclib) - [One-time donation via PayPal or crypto-currencies](http://sourceforge.net/donate/index.php?group_id=198487) - [Subscribe to Tidelift](https://tidelift.com/subscription/pkg/packagist-phpseclib-mcrypt-compat?utm_source=packagist-phpseclib-mcrypt-compat&utm_medium=referral&utm_campaign=readme) ## Installation With [Composer](https://getcomposer.org/): ``` composer require phpseclib/mcrypt_compat ``` ## Supported algorithms - rijndael-128 - rijndael-192 - rijndael-256 - des - blowfish - rc2 - tripledes - arcfour ## Unsupported algorithms - cast-128 - gost - cast-256 - loki97 - saferplus - wake - blowfish-compat - serpent - xtea - enigma ## Supported modes - cbc - ncfb - cfb - ctr - ecb - nofb - ofb - stream mcrypt_compat's `ncfb` implementation has some incompatibles with mcrypt's implementation where `mcrypt_generic` and `mdecrypt_generic` are concerned. The unit tests elaborate. ## Emulating older PHP versions The mcrypt extension's behavior underwent changes as new versions of PHP were released. By default mcrypt_compat emulates the behavior of PHP 7.1 but if you need to emulate how mcrypt behaved in, say, PHP 5.3.0, you may do so by doing `define('PHPSECLIB_MCRYPT_TARGET_VERSION', '5.3.0');` before including vendor/autoload.php (if you're using this with Composer). ## Security contact information To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com/security). Tidelift will coordinate the fix and disclosure.