Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
namespace Cart2Quote\License\Security; use Cart2Quote\License\Security\Crypto\Mcrypt; use..
Decoded Output download
<? namespace Cart2Quote\License\Security; use Cart2Quote\License\Security\Crypto\Mcrypt; use Cart2Quote\License\Security\Crypto\OpenSsl; use InvalidArgumentException; final class Security { public static $Bxf2a = "sha1"; protected static $c0eao; protected static $sM4im; public static function setHash($CPh4a) { static::$Bxf2a = $CPh4a; } public static function randomBytes($G2nPU) { goto F0OO0; F0OO0: if (!function_exists("random_bytes")) { goto F2aWY; } goto Jukq5; U_jUY: F2aWY: goto vHY8N; vHY8N: if (!function_exists("openssl_random_pseudo_bytes")) { goto O6qFK; } goto DFLyg; ZIVGG: return $U1bEZ; goto kvL9P; GXz75: return static::insecureRandomBytes($G2nPU); goto dQRG5; jIyQN: trigger_error("openssl was unable to use a strong source of entropy. " . "Consider updating your system libraries, or ensuring " . "you have more available entropy.", E_USER_WARNING); goto BOkKU; peRg9: trigger_error("You do not have a safe source of random data available. " . "Install either the openssl extension, or paragonie/random_compat. " . "Falling back to an insecure random source.", E_USER_WARNING); goto GXz75; qXLsl: if ($n3wRP) { goto EmXuX; } goto jIyQN; DFLyg: $U1bEZ = openssl_random_pseudo_bytes($G2nPU, $n3wRP); goto qXLsl; kvL9P: O6qFK: goto peRg9; BOkKU: EmXuX: goto ZIVGG; Jukq5: return random_bytes($G2nPU); goto U_jUY; dQRG5: } public static function insecureRandomBytes($G2nPU) { goto OPGdG; escjz: vlL6k: goto l57jz; u9Ets: $lhMH_ = strlen($U1bEZ); goto huLC4; OPGdG: $G2nPU *= 2; goto Cj2iB; Cj2iB: $U1bEZ = ''; goto IrEgS; dXn26: AIDw9: goto UOUj5; IrEgS: $lhMH_ = 0; goto dXn26; l57jz: $U1bEZ = substr($U1bEZ, 0, $G2nPU); goto U702C; UOUj5: if (!($lhMH_ < $G2nPU)) { goto vlL6k; } goto wLBGc; wLBGc: $U1bEZ .= static::hash(Text::uuid() . uniqid(mt_rand(), true), "sha512", true); goto u9Ets; huLC4: goto AIDw9; goto escjz; U702C: return pack("H*", $U1bEZ); goto lbc2m; lbc2m: } public static function hash($Yc7w8, $yln17 = null, $G9shQ = false) { goto iOVda; ua1ux: if (is_string($G9shQ)) { goto BwQlf; } goto eV730; EahHj: $yln17 = strtolower($yln17); goto KrGFi; sV0Nd: $Yc7w8 = $G9shQ . $Yc7w8; goto OLdcM; OLdcM: BHu0p: goto okjBB; okjBB: return hash($yln17, $Yc7w8); goto ABa7h; MDhjl: W2M0x: goto EahHj; eV730: $G9shQ = static::$c0eao; goto Tzlia; iOVda: if (!empty($yln17)) { goto W2M0x; } goto cokmy; Tzlia: BwQlf: goto sV0Nd; KrGFi: if (!$G9shQ) { goto BHu0p; } goto ua1ux; cokmy: $yln17 = static::$Bxf2a; goto MDhjl; ABa7h: } public static function rijndael($fJ2Cu, $hPqG7, $wV272) { goto N9Vx0; cqh1b: JgPwP: goto rolw_; XCGp4: throw new InvalidArgumentException("You cannot use an empty key for Security::rijndael()"); goto cqh1b; ITYrJ: if (!(mb_strlen($hPqG7, "8bit") < 32)) { goto cxwz0; } goto pN1LZ; ebO1X: throw new InvalidArgumentException("You must specify the operation for Security::rijndael(), either encrypt or decrypt"); goto dRnt4; pbugO: return $cYOnZ->rijndael($fJ2Cu, $hPqG7, $wV272); goto hslgh; fJ31a: cxwz0: goto c5Hey; c5Hey: $cYOnZ = static::engine(); goto pbugO; dRnt4: kW23E: goto ITYrJ; N9Vx0: if (!empty($hPqG7)) { goto JgPwP; } goto XCGp4; pN1LZ: throw new InvalidArgumentException("You must use a key larger than 32 bytes for Security::rijndael()"); goto fJ31a; rolw_: if (!(empty($wV272) || !in_array($wV272, ["encrypt", "decrypt"]))) { goto kW23E; } goto ebO1X; hslgh: } public static function engine($emAhC = null) { goto zSuWO; QoqpL: static::$sM4im = $emAhC; goto yaYCp; qGcOY: $emAhC = new OpenSsl(); goto yX2st; fUVRk: if (extension_loaded("openssl")) { goto XwOw6; } goto RBK_t; bSGsu: LOOhL: goto n0ANP; B2f8n: return static::$sM4im; goto SS583; E0kFT: if (!$emAhC) { goto BX0io; } goto QoqpL; JuFiU: if (!isset(static::$sM4im)) { goto pzBzX; } goto B2f8n; eiUev: goto LOOhL; goto En2N3; gLfIc: $emAhC = new Mcrypt(); goto bSGsu; SS583: pzBzX: goto puWYl; En2N3: XwOw6: goto qGcOY; yaYCp: BX0io: goto JuFiU; puWYl: throw new InvalidArgumentException("No compatible crypto engine available. " . "Load either the openssl or mcrypt extensions"); goto HVnum; zSuWO: if (!($emAhC === null && static::$sM4im === null)) { goto kojce; } goto fUVRk; yX2st: goto LOOhL; goto rTa4F; RBK_t: if (extension_loaded("mcrypt")) { goto YObau; } goto eiUev; n0ANP: kojce: goto E0kFT; rTa4F: YObau: goto gLfIc; HVnum: } public static function encrypt($nkrNj, $hPqG7, $eMtHv = null) { goto qGAPL; AEzT8: return $qjaKl . $UB2Yv; goto znlVs; BGTka: $UB2Yv = $cYOnZ->encrypt($nkrNj, $hPqG7); goto mfJxH; mfJxH: $qjaKl = hash_hmac("sha256", $UB2Yv, $hPqG7); goto AEzT8; rWID7: $hPqG7 = mb_substr(hash("sha256", $hPqG7 . $eMtHv), 0, 32, "8bit"); goto G7zvP; xiCPu: $eMtHv = static::$c0eao; goto T8FLe; qGAPL: self::_checkKey($hPqG7, "encrypt()"); goto Sxm_j; G7zvP: $cYOnZ = static::engine(); goto BGTka; Sxm_j: if (!($eMtHv === null)) { goto zegiY; } goto xiCPu; T8FLe: zegiY: goto rWID7; znlVs: } protected static function _checkKey($hPqG7, $erOEc) { goto pb1WP; J2M3B: throw new InvalidArgumentException(sprintf("Invalid key for %s, key must be at least 256 bits (32 bytes) long.", $erOEc)); goto C_OJx; pb1WP: if (!(mb_strlen($hPqG7, "8bit") < 32)) { goto obwQ0; } goto J2M3B; C_OJx: obwQ0: goto Xn9pf; Xn9pf: } public static function decrypt($fV_kG, $hPqG7, $eMtHv = null) { goto WraP0; WraP0: self::_checkKey($hPqG7, "decrypt()"); goto xAdB0; AibIj: return false; goto GUcyM; CAbCW: throw new InvalidArgumentException("The data to decrypt cannot be empty."); goto S_Ly0; zpswA: return $cYOnZ->decrypt($fV_kG, $hPqG7); goto xI4Xl; wAx2i: $XVl13 = hash_hmac("sha256", $fV_kG, $hPqG7); goto KWXMW; CPm33: $eMtHv = static::$c0eao; goto ht89C; S_Ly0: KLjWQ: goto G1yAa; G1yAa: if (!($eMtHv === null)) { goto De85G; } goto CPm33; xAdB0: if (!empty($fV_kG)) { goto KLjWQ; } goto CAbCW; KdXyw: $i8yXv = 64; goto GtC0M; a72lN: $cYOnZ = static::engine(); goto zpswA; KWXMW: if (static::_constantEquals($qjaKl, $XVl13)) { goto etx43; } goto AibIj; ht89C: De85G: goto Aaa3A; mBp60: $fV_kG = mb_substr($fV_kG, $i8yXv, null, "8bit"); goto wAx2i; GtC0M: $qjaKl = mb_substr($fV_kG, 0, $i8yXv, "8bit"); goto mBp60; GUcyM: etx43: goto a72lN; Aaa3A: $hPqG7 = mb_substr(hash("sha256", $hPqG7 . $eMtHv), 0, 32, "8bit"); goto KdXyw; xI4Xl: } protected static function _constantEquals($qjaKl, $XurBh) { goto lXeqc; slDBK: return $GEEDo === 0; goto OfRCu; TpaZw: $UuFXw = mb_strlen($qjaKl, "8bit"); goto PsKME; DaCNn: return hash_equals($qjaKl, $XurBh); goto ujWCw; Zr4V4: $GEEDo |= ord($qjaKl[$m7arj]) ^ ord($XurBh[$m7arj]); goto fKYXw; kiZDb: $m7arj = 0; goto J8jm2; sfKvM: if (!($UuFXw !== $aULmO)) { goto Vyy9D; } goto Jt4z6; QJmPU: Vyy9D: goto WDkaK; tpP5n: DuyY0: goto slDBK; WDkaK: $GEEDo = 0; goto kiZDb; PsKME: $aULmO = mb_strlen($XurBh, "8bit"); goto sfKvM; Jt4z6: return false; goto QJmPU; J8jm2: DkXPF: goto fd3TT; fKYXw: Azmcp: goto giWDv; lXeqc: if (!function_exists("hash_equals")) { goto JYEUt; } goto DaCNn; l_LEk: goto DkXPF; goto tpP5n; fd3TT: if (!($m7arj < $UuFXw)) { goto DuyY0; } goto Zr4V4; giWDv: $m7arj++; goto l_LEk; ujWCw: JYEUt: goto TpaZw; OfRCu: } public static function getSalt() { return static::$c0eao; } public static function setSalt($G9shQ) { static::$c0eao = (string) $G9shQ; } public static function salt($G9shQ = null) { goto WVoBC; YPvbv: return static::$c0eao = (string) $G9shQ; goto v4PQ0; EB8bC: return static::$c0eao; goto dOEwt; WVoBC: if (!($G9shQ === null)) { goto U10b1; } goto EB8bC; dOEwt: U10b1: goto YPvbv; v4PQ0: } } ?>
Did this file decode correctly?
Original Code
namespace Cart2Quote\License\Security; use Cart2Quote\License\Security\Crypto\Mcrypt; use Cart2Quote\License\Security\Crypto\OpenSsl; use InvalidArgumentException; final class Security { public static $Bxf2a = "\x73\x68\141\x31"; protected static $c0eao; protected static $sM4im; public static function setHash($CPh4a) { static::$Bxf2a = $CPh4a; } public static function randomBytes($G2nPU) { goto F0OO0; F0OO0: if (!function_exists("\162\141\156\x64\157\155\137\x62\x79\164\x65\x73")) { goto F2aWY; } goto Jukq5; U_jUY: F2aWY: goto vHY8N; vHY8N: if (!function_exists("\157\x70\145\x6e\163\163\x6c\x5f\162\141\156\x64\157\x6d\x5f\160\x73\145\165\144\x6f\x5f\142\x79\x74\145\163")) { goto O6qFK; } goto DFLyg; ZIVGG: return $U1bEZ; goto kvL9P; GXz75: return static::insecureRandomBytes($G2nPU); goto dQRG5; jIyQN: trigger_error("\157\x70\x65\x6e\163\x73\x6c\40\167\x61\163\40\x75\156\x61\142\x6c\x65\40\164\157\40\x75\163\x65\40\x61\x20\163\164\x72\157\156\x67\x20\x73\x6f\165\162\143\145\40\157\x66\40\145\156\164\162\x6f\x70\171\56\40" . "\103\x6f\156\163\151\144\145\162\40\165\160\144\141\x74\151\x6e\x67\x20\171\x6f\165\162\x20\x73\171\x73\x74\x65\155\x20\154\x69\x62\162\141\x72\x69\145\163\54\40\157\162\x20\145\156\163\x75\x72\x69\x6e\x67\x20" . "\x79\157\x75\x20\x68\x61\166\x65\x20\x6d\157\x72\x65\40\141\x76\x61\x69\x6c\141\x62\154\x65\40\x65\156\164\x72\x6f\160\171\56", E_USER_WARNING); goto BOkKU; peRg9: trigger_error("\x59\157\165\40\144\157\40\156\x6f\164\40\150\x61\x76\145\40\141\40\x73\141\146\x65\x20\163\x6f\x75\x72\x63\x65\x20\x6f\x66\40\x72\x61\156\x64\x6f\x6d\x20\144\141\164\141\x20\141\x76\141\x69\154\x61\x62\154\145\56\40" . "\111\156\163\x74\x61\154\x6c\x20\145\151\164\150\145\162\x20\164\150\145\x20\x6f\x70\x65\x6e\163\x73\154\40\145\170\164\x65\x6e\163\x69\x6f\156\54\x20\x6f\162\x20\160\141\x72\x61\147\157\x6e\151\145\57\162\x61\x6e\144\x6f\x6d\137\143\x6f\155\160\141\x74\56\40" . "\106\141\x6c\154\x69\156\147\40\x62\141\x63\x6b\40\x74\157\x20\141\x6e\x20\x69\x6e\x73\145\x63\x75\x72\145\40\x72\x61\x6e\144\157\155\40\163\157\165\x72\x63\x65\x2e", E_USER_WARNING); goto GXz75; qXLsl: if ($n3wRP) { goto EmXuX; } goto jIyQN; DFLyg: $U1bEZ = openssl_random_pseudo_bytes($G2nPU, $n3wRP); goto qXLsl; kvL9P: O6qFK: goto peRg9; BOkKU: EmXuX: goto ZIVGG; Jukq5: return random_bytes($G2nPU); goto U_jUY; dQRG5: } public static function insecureRandomBytes($G2nPU) { goto OPGdG; escjz: vlL6k: goto l57jz; u9Ets: $lhMH_ = strlen($U1bEZ); goto huLC4; OPGdG: $G2nPU *= 2; goto Cj2iB; Cj2iB: $U1bEZ = ''; goto IrEgS; dXn26: AIDw9: goto UOUj5; IrEgS: $lhMH_ = 0; goto dXn26; l57jz: $U1bEZ = substr($U1bEZ, 0, $G2nPU); goto U702C; UOUj5: if (!($lhMH_ < $G2nPU)) { goto vlL6k; } goto wLBGc; wLBGc: $U1bEZ .= static::hash(Text::uuid() . uniqid(mt_rand(), true), "\x73\x68\x61\x35\61\x32", true); goto u9Ets; huLC4: goto AIDw9; goto escjz; U702C: return pack("\110\52", $U1bEZ); goto lbc2m; lbc2m: } public static function hash($Yc7w8, $yln17 = null, $G9shQ = false) { goto iOVda; ua1ux: if (is_string($G9shQ)) { goto BwQlf; } goto eV730; EahHj: $yln17 = strtolower($yln17); goto KrGFi; sV0Nd: $Yc7w8 = $G9shQ . $Yc7w8; goto OLdcM; OLdcM: BHu0p: goto okjBB; okjBB: return hash($yln17, $Yc7w8); goto ABa7h; MDhjl: W2M0x: goto EahHj; eV730: $G9shQ = static::$c0eao; goto Tzlia; iOVda: if (!empty($yln17)) { goto W2M0x; } goto cokmy; Tzlia: BwQlf: goto sV0Nd; KrGFi: if (!$G9shQ) { goto BHu0p; } goto ua1ux; cokmy: $yln17 = static::$Bxf2a; goto MDhjl; ABa7h: } public static function rijndael($fJ2Cu, $hPqG7, $wV272) { goto N9Vx0; cqh1b: JgPwP: goto rolw_; XCGp4: throw new InvalidArgumentException("\131\157\x75\40\143\141\x6e\156\157\164\x20\165\163\x65\40\x61\x6e\40\x65\155\x70\164\171\40\x6b\x65\x79\40\x66\x6f\x72\x20\x53\x65\143\165\162\x69\x74\x79\x3a\x3a\162\x69\152\156\144\141\x65\x6c\50\x29"); goto cqh1b; ITYrJ: if (!(mb_strlen($hPqG7, "\x38\x62\151\164") < 32)) { goto cxwz0; } goto pN1LZ; ebO1X: throw new InvalidArgumentException("\x59\157\x75\x20\155\165\163\164\40\x73\160\145\143\x69\x66\171\x20\164\150\145\x20\x6f\160\x65\162\141\x74\151\x6f\156\40\x66\x6f\162\x20\123\145\143\x75\162\151\164\171\x3a\72\x72\x69\x6a\156\144\x61\x65\x6c\50\x29\54\x20\x65\151\164\x68\x65\162\40\x65\156\x63\x72\171\x70\x74\40\157\x72\x20\144\x65\143\x72\x79\x70\164"); goto dRnt4; pbugO: return $cYOnZ->rijndael($fJ2Cu, $hPqG7, $wV272); goto hslgh; fJ31a: cxwz0: goto c5Hey; c5Hey: $cYOnZ = static::engine(); goto pbugO; dRnt4: kW23E: goto ITYrJ; N9Vx0: if (!empty($hPqG7)) { goto JgPwP; } goto XCGp4; pN1LZ: throw new InvalidArgumentException("\x59\157\x75\x20\155\x75\x73\164\40\x75\x73\x65\x20\x61\x20\153\145\x79\x20\x6c\x61\162\x67\x65\x72\40\164\x68\141\156\x20\63\x32\x20\x62\x79\164\x65\x73\40\x66\157\x72\40\x53\x65\x63\165\162\x69\164\x79\x3a\72\162\151\152\x6e\x64\141\145\x6c\50\x29"); goto fJ31a; rolw_: if (!(empty($wV272) || !in_array($wV272, ["\145\x6e\x63\162\x79\x70\164", "\x64\145\x63\162\x79\x70\164"]))) { goto kW23E; } goto ebO1X; hslgh: } public static function engine($emAhC = null) { goto zSuWO; QoqpL: static::$sM4im = $emAhC; goto yaYCp; qGcOY: $emAhC = new OpenSsl(); goto yX2st; fUVRk: if (extension_loaded("\x6f\160\145\156\x73\x73\154")) { goto XwOw6; } goto RBK_t; bSGsu: LOOhL: goto n0ANP; B2f8n: return static::$sM4im; goto SS583; E0kFT: if (!$emAhC) { goto BX0io; } goto QoqpL; JuFiU: if (!isset(static::$sM4im)) { goto pzBzX; } goto B2f8n; eiUev: goto LOOhL; goto En2N3; gLfIc: $emAhC = new Mcrypt(); goto bSGsu; SS583: pzBzX: goto puWYl; En2N3: XwOw6: goto qGcOY; yaYCp: BX0io: goto JuFiU; puWYl: throw new InvalidArgumentException("\x4e\x6f\40\143\157\155\x70\141\x74\x69\x62\154\145\40\143\162\171\160\x74\x6f\x20\x65\156\147\x69\x6e\x65\x20\141\166\x61\x69\154\141\x62\154\145\x2e\x20" . "\x4c\x6f\141\x64\40\x65\x69\164\x68\x65\x72\40\x74\x68\145\x20\157\160\x65\156\x73\x73\x6c\x20\x6f\162\x20\155\x63\x72\171\x70\x74\40\x65\170\x74\145\156\x73\x69\157\x6e\163"); goto HVnum; zSuWO: if (!($emAhC === null && static::$sM4im === null)) { goto kojce; } goto fUVRk; yX2st: goto LOOhL; goto rTa4F; RBK_t: if (extension_loaded("\x6d\x63\x72\171\160\x74")) { goto YObau; } goto eiUev; n0ANP: kojce: goto E0kFT; rTa4F: YObau: goto gLfIc; HVnum: } public static function encrypt($nkrNj, $hPqG7, $eMtHv = null) { goto qGAPL; AEzT8: return $qjaKl . $UB2Yv; goto znlVs; BGTka: $UB2Yv = $cYOnZ->encrypt($nkrNj, $hPqG7); goto mfJxH; mfJxH: $qjaKl = hash_hmac("\x73\x68\141\x32\65\66", $UB2Yv, $hPqG7); goto AEzT8; rWID7: $hPqG7 = mb_substr(hash("\163\x68\x61\62\x35\66", $hPqG7 . $eMtHv), 0, 32, "\70\x62\151\x74"); goto G7zvP; xiCPu: $eMtHv = static::$c0eao; goto T8FLe; qGAPL: self::_checkKey($hPqG7, "\x65\x6e\x63\162\x79\160\x74\50\x29"); goto Sxm_j; G7zvP: $cYOnZ = static::engine(); goto BGTka; Sxm_j: if (!($eMtHv === null)) { goto zegiY; } goto xiCPu; T8FLe: zegiY: goto rWID7; znlVs: } protected static function _checkKey($hPqG7, $erOEc) { goto pb1WP; J2M3B: throw new InvalidArgumentException(sprintf("\111\x6e\166\141\x6c\151\144\40\153\145\171\40\x66\157\162\x20\x25\x73\54\40\x6b\x65\x79\40\x6d\165\163\x74\40\x62\x65\x20\141\164\x20\x6c\x65\141\163\x74\40\62\x35\66\40\x62\151\x74\x73\40\x28\63\62\40\142\x79\164\145\x73\x29\40\154\157\156\147\56", $erOEc)); goto C_OJx; pb1WP: if (!(mb_strlen($hPqG7, "\70\142\x69\x74") < 32)) { goto obwQ0; } goto J2M3B; C_OJx: obwQ0: goto Xn9pf; Xn9pf: } public static function decrypt($fV_kG, $hPqG7, $eMtHv = null) { goto WraP0; WraP0: self::_checkKey($hPqG7, "\144\x65\143\162\x79\x70\164\50\x29"); goto xAdB0; AibIj: return false; goto GUcyM; CAbCW: throw new InvalidArgumentException("\124\150\x65\40\x64\141\164\x61\x20\x74\x6f\x20\144\145\143\162\171\x70\x74\40\x63\x61\156\156\x6f\164\40\142\145\40\x65\155\160\164\171\56"); goto S_Ly0; zpswA: return $cYOnZ->decrypt($fV_kG, $hPqG7); goto xI4Xl; wAx2i: $XVl13 = hash_hmac("\163\x68\141\x32\x35\66", $fV_kG, $hPqG7); goto KWXMW; CPm33: $eMtHv = static::$c0eao; goto ht89C; S_Ly0: KLjWQ: goto G1yAa; G1yAa: if (!($eMtHv === null)) { goto De85G; } goto CPm33; xAdB0: if (!empty($fV_kG)) { goto KLjWQ; } goto CAbCW; KdXyw: $i8yXv = 64; goto GtC0M; a72lN: $cYOnZ = static::engine(); goto zpswA; KWXMW: if (static::_constantEquals($qjaKl, $XVl13)) { goto etx43; } goto AibIj; ht89C: De85G: goto Aaa3A; mBp60: $fV_kG = mb_substr($fV_kG, $i8yXv, null, "\x38\x62\151\164"); goto wAx2i; GtC0M: $qjaKl = mb_substr($fV_kG, 0, $i8yXv, "\x38\x62\151\164"); goto mBp60; GUcyM: etx43: goto a72lN; Aaa3A: $hPqG7 = mb_substr(hash("\163\x68\141\x32\x35\66", $hPqG7 . $eMtHv), 0, 32, "\70\x62\151\164"); goto KdXyw; xI4Xl: } protected static function _constantEquals($qjaKl, $XurBh) { goto lXeqc; slDBK: return $GEEDo === 0; goto OfRCu; TpaZw: $UuFXw = mb_strlen($qjaKl, "\70\x62\151\x74"); goto PsKME; DaCNn: return hash_equals($qjaKl, $XurBh); goto ujWCw; Zr4V4: $GEEDo |= ord($qjaKl[$m7arj]) ^ ord($XurBh[$m7arj]); goto fKYXw; kiZDb: $m7arj = 0; goto J8jm2; sfKvM: if (!($UuFXw !== $aULmO)) { goto Vyy9D; } goto Jt4z6; QJmPU: Vyy9D: goto WDkaK; tpP5n: DuyY0: goto slDBK; WDkaK: $GEEDo = 0; goto kiZDb; PsKME: $aULmO = mb_strlen($XurBh, "\x38\142\151\x74"); goto sfKvM; Jt4z6: return false; goto QJmPU; J8jm2: DkXPF: goto fd3TT; fKYXw: Azmcp: goto giWDv; lXeqc: if (!function_exists("\150\141\163\x68\137\x65\161\x75\141\154\163")) { goto JYEUt; } goto DaCNn; l_LEk: goto DkXPF; goto tpP5n; fd3TT: if (!($m7arj < $UuFXw)) { goto DuyY0; } goto Zr4V4; giWDv: $m7arj++; goto l_LEk; ujWCw: JYEUt: goto TpaZw; OfRCu: } public static function getSalt() { return static::$c0eao; } public static function setSalt($G9shQ) { static::$c0eao = (string) $G9shQ; } public static function salt($G9shQ = null) { goto WVoBC; YPvbv: return static::$c0eao = (string) $G9shQ; goto v4PQ0; EB8bC: return static::$c0eao; goto dOEwt; WVoBC: if (!($G9shQ === null)) { goto U10b1; } goto EB8bC; dOEwt: U10b1: goto YPvbv; v4PQ0: } }
Function Calls
None |
Stats
MD5 | 040ed52cf85754c57ca610016c86a8a1 |
Eval Count | 0 |
Decode Time | 49 ms |