Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

public static function processSamlRequestAndSendResponse() { if (self::chec..

Decoded Output download

<?   public static function processSamlRequestAndSendResponse() 
    { 
        if (self::checkUserPasswordReset($_SERVER) && isset($_COOKIE["response_params"])) { 
            goto qg; 
        } 
        if (!\Drupal::config("miniorange_saml_idp.settings")->get("mo_saml_idp_debugging_log")) { 
            goto mc; 
        } 
        \Drupal::logger("miniorange_saml_idp")->debug('' . date("d F Y H:i:s", time()) . __FILE__ . ", miniorange_saml_idp_user_login, " . __LINE__ . ": response_parameters not available to be fetched from cookie."); 
        mc: 
        goto hS; 
        qg: 
        $ye = \Drupal::config("miniorange_saml_idp.settings")->get("mo_saml_enable_2fa_rule_for_euronext"); 
        if (!($ye == TRUE && isset($_COOKIE["miniOrangeInvoke2Fa"]) && $_COOKIE["miniOrangeInvoke2Fa"] == TRUE)) { 
            goto Zm; 
        } 
        \Drupal::logger("miniOrange_saml_idp")->info("miniOrangeInvoke2Fa cookie found"); 
        unset($_COOKIE["miniOrangeInvoke2Fa"]); 
        \Drupal::moduleHandler()->invokeAll("two_factor_authentication_miniorange_initTfaProcess"); 
        Zm: 
        self::addLogger(__FILE__, __FUNCTION__, __LINE__, "response_parameters fetched from the cookie."); 
        $Rk = Json::decode($_COOKIE["response_params"]); 
        foreach ($Rk as $S5 => $LR) { 
            self::moIDPSanitizeParameters($LR); 
            $S5 = filter_var($S5, FILTER_VALIDATE_INT); 
            if (!($LR["response_sent"] == FALSE)) { 
                goto Kp; 
            } 
            $Rk[$S5]["response_sent"] = TRUE; 
            if (!($LR["slo_configured"] === false)) { 
                goto tG; 
            } 
            unset($Rk[$S5]); 
            tG: 
            self::addLogger(__FILE__, __FUNCTION__, __LINE__, "Updating response_parameters value in cookie."); 
            self::moIDPSetCookie("response_params", Json::encode($Rk), time() + 7200); 
            if (!(strcmp($LR["moIdpsendResponse"], "true") == 0)) { 
                goto YY; 
            } 
            $H4 = new miniorange_saml_idpController(); 
            self::addLogger(__FILE__, __FUNCTION__, __LINE__, "Redirecting to mo_idp_send_response."); 
            $H4->mo_idp_send_response($S5, $LR["acs_url"], $LR["audience"], $LR["relayState"], $LR["inResponseTo"]); 
            YY: 
            Kp: 
            IW: 
        } 
        Tc: 
        hS: 
    } ?>

Did this file decode correctly?

Original Code

 public static function processSamlRequestAndSendResponse()
    {
        if (self::checkUserPasswordReset($_SERVER) && isset($_COOKIE["\x72\x65\x73\160\x6f\156\163\145\137\x70\141\x72\141\x6d\163"])) {
            goto qg;
        }
        if (!\Drupal::config("\x6d\151\156\x69\157\x72\141\156\147\x65\x5f\x73\x61\x6d\x6c\x5f\151\144\160\56\163\x65\164\x74\151\156\147\x73")->get("\x6d\157\x5f\x73\x61\x6d\x6c\x5f\x69\144\x70\x5f\144\145\x62\x75\147\x67\151\156\x67\137\154\x6f\x67")) {
            goto mc;
        }
        \Drupal::logger("\x6d\151\x6e\151\157\162\x61\156\147\145\x5f\x73\141\x6d\x6c\137\x69\x64\160")->debug('' . date("\144\x20\x46\x20\131\x20\x48\72\x69\x3a\x73", time()) . __FILE__ . "\x2c\40\x6d\151\x6e\x69\x6f\x72\141\x6e\147\145\137\x73\x61\x6d\x6c\137\151\144\160\137\165\163\x65\x72\137\154\157\x67\151\156\54\40" . __LINE__ . "\72\x20\x72\145\x73\x70\157\156\x73\x65\137\160\x61\162\141\x6d\145\x74\145\x72\163\x20\x6e\x6f\164\40\141\x76\x61\x69\x6c\141\142\x6c\x65\x20\164\x6f\x20\142\x65\x20\146\x65\164\x63\x68\x65\144\x20\x66\x72\157\x6d\40\143\157\x6f\x6b\151\x65\x2e");
        mc:
        goto hS;
        qg:
        $ye = \Drupal::config("\155\x69\156\151\157\x72\141\156\147\145\x5f\x73\x61\x6d\x6c\137\x69\144\160\x2e\x73\x65\x74\x74\x69\156\x67\x73")->get("\x6d\x6f\x5f\163\141\155\x6c\x5f\145\156\141\x62\154\x65\x5f\62\x66\x61\x5f\x72\165\x6c\x65\137\x66\157\162\x5f\x65\165\x72\157\156\x65\x78\x74");
        if (!($ye == TRUE && isset($_COOKIE["\155\x69\156\151\117\162\141\156\147\145\111\156\x76\157\x6b\x65\x32\x46\x61"]) && $_COOKIE["\155\x69\156\151\117\162\141\156\x67\x65\x49\156\x76\157\x6b\x65\x32\x46\x61"] == TRUE)) {
            goto Zm;
        }
        \Drupal::logger("\155\x69\x6e\151\117\162\141\156\x67\145\x5f\x73\x61\x6d\154\x5f\151\x64\x70")->info("\x6d\x69\x6e\x69\117\x72\x61\156\x67\145\x49\156\166\157\x6b\x65\x32\106\141\x20\143\x6f\x6f\x6b\151\x65\x20\x66\x6f\165\x6e\144");
        unset($_COOKIE["\x6d\151\156\x69\x4f\x72\x61\x6e\147\x65\111\156\166\x6f\x6b\x65\62\x46\x61"]);
        \Drupal::moduleHandler()->invokeAll("\x74\x77\x6f\x5f\x66\x61\x63\164\157\x72\137\x61\165\x74\150\x65\x6e\x74\x69\143\x61\164\151\157\x6e\x5f\155\x69\x6e\x69\x6f\162\x61\156\147\x65\x5f\x69\x6e\x69\164\x54\146\141\120\162\157\143\145\x73\163");
        Zm:
        self::addLogger(__FILE__, __FUNCTION__, __LINE__, "\x72\145\163\160\x6f\156\163\145\x5f\160\x61\x72\x61\155\x65\164\145\162\163\x20\x66\145\x74\x63\150\x65\144\x20\x66\x72\x6f\155\40\x74\150\x65\40\x63\157\157\x6b\151\145\56");
        $Rk = Json::decode($_COOKIE["\162\145\163\x70\157\x6e\163\x65\137\160\141\162\141\155\163"]);
        foreach ($Rk as $S5 => $LR) {
            self::moIDPSanitizeParameters($LR);
            $S5 = filter_var($S5, FILTER_VALIDATE_INT);
            if (!($LR["\x72\145\x73\x70\157\x6e\x73\145\x5f\x73\145\156\x74"] == FALSE)) {
                goto Kp;
            }
            $Rk[$S5]["\162\145\163\160\x6f\156\163\x65\x5f\163\145\x6e\x74"] = TRUE;
            if (!($LR["\x73\x6c\157\x5f\x63\157\156\x66\151\147\x75\x72\145\x64"] === false)) {
                goto tG;
            }
            unset($Rk[$S5]);
            tG:
            self::addLogger(__FILE__, __FUNCTION__, __LINE__, "\125\160\144\141\164\x69\x6e\x67\x20\162\x65\163\x70\x6f\156\163\145\x5f\x70\141\x72\141\155\145\164\145\162\163\x20\x76\x61\154\165\145\40\x69\x6e\x20\143\x6f\157\153\x69\145\x2e");
            self::moIDPSetCookie("\x72\x65\x73\x70\x6f\156\163\x65\137\160\x61\162\141\155\163", Json::encode($Rk), time() + 7200);
            if (!(strcmp($LR["\155\x6f\111\144\x70\163\145\156\144\122\x65\x73\x70\x6f\156\163\145"], "\164\162\x75\145") == 0)) {
                goto YY;
            }
            $H4 = new miniorange_saml_idpController();
            self::addLogger(__FILE__, __FUNCTION__, __LINE__, "\122\145\x64\151\x72\145\x63\164\151\156\147\40\x74\x6f\x20\x6d\x6f\137\151\x64\x70\137\x73\x65\156\144\137\162\x65\163\x70\157\156\x73\x65\x2e");
            $H4->mo_idp_send_response($S5, $LR["\141\x63\x73\x5f\165\x72\154"], $LR["\x61\165\144\x69\x65\156\x63\145"], $LR["\162\x65\x6c\141\x79\x53\164\141\x74\145"], $LR["\x69\x6e\x52\145\163\160\157\156\163\x65\x54\157"]);
            YY:
            Kp:
            IW:
        }
        Tc:
        hS:
    }

Function Calls

None

Variables

None

Stats

MD5 8019588d7057b0adbe392d7c57c311d0
Eval Count 0
Decode Time 91 ms