Server : Apache/2.4.41 (Ubuntu) System : Linux wpfpm 5.4.0-1133-kvm #142-Ubuntu SMP Fri May 2 19:51:44 UTC 2025 x86_64 User : wpmodel1 ( 1034) PHP Version : 7.4.3-4ubuntu2.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, Directory : /var/www/html/wp3/wp-content/plugins/updraftplus/ |
Upload File : |
<?php // @codingStandardsIgnoreStart /* To dump the decrypted file using the given key on stdout, call: rijndael_decrypt_file('../path/to/file.crypt' , 'mykey'); Thus, here are the easy instructions: 1) Add a line like the above into this PHP file (not inside these comments, but outside) e.g. rijndael_decrypt_file('/home/myself/myfile.crypt' , 'MYKEY'); 2) Run this file (and make sure that includes/Rijndael.php is available, if you are moving this file around) e.g. php /home/myself/example-decrypt.php >output.sql.gz 3) You may then want to gunzip the resulting file to have a standard SQL file. e.g. gunzip output.sql.gz */ // @codingStandardsIgnoreEnd /** * An example of how to decrypt a file * * @param String $file Full path to file to decrypt * @param String $key Key or salting to be used */ function rijndael_decrypt_file($file, $key) { include_once(dirname(__FILE__).'/vendor/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php'); $rijndael = new Crypt_Rijndael(); $rijndael->setKey($key); $ciphertext = file_get_contents($file); print $rijndael->decrypt($ciphertext);// phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped -- intentional binary output }