Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
public static function processSamlRequestAndSendResponse() { if (self::chec..
Decoded Output download
<? public static function processSamlRequestAndSendResponse()
{
if (self::checkUserPasswordReset($_SERVER) && isset($_COOKIE["response_params"])) {
goto qg;
}
if (!\Drupal::config("miniorange_saml_idp.settings")->get("mo_saml_idp_debugging_log")) {
goto mc;
}
\Drupal::logger("miniorange_saml_idp")->debug('' . date("d F Y H:i:s", time()) . __FILE__ . ", miniorange_saml_idp_user_login, " . __LINE__ . ": response_parameters not available to be fetched from cookie.");
mc:
goto hS;
qg:
$ye = \Drupal::config("miniorange_saml_idp.settings")->get("mo_saml_enable_2fa_rule_for_euronext");
if (!($ye == TRUE && isset($_COOKIE["miniOrangeInvoke2Fa"]) && $_COOKIE["miniOrangeInvoke2Fa"] == TRUE)) {
goto Zm;
}
\Drupal::logger("miniOrange_saml_idp")->info("miniOrangeInvoke2Fa cookie found");
unset($_COOKIE["miniOrangeInvoke2Fa"]);
\Drupal::moduleHandler()->invokeAll("two_factor_authentication_miniorange_initTfaProcess");
Zm:
self::addLogger(__FILE__, __FUNCTION__, __LINE__, "response_parameters fetched from the cookie.");
$Rk = Json::decode($_COOKIE["response_params"]);
foreach ($Rk as $S5 => $LR) {
self::moIDPSanitizeParameters($LR);
$S5 = filter_var($S5, FILTER_VALIDATE_INT);
if (!($LR["response_sent"] == FALSE)) {
goto Kp;
}
$Rk[$S5]["response_sent"] = TRUE;
if (!($LR["slo_configured"] === false)) {
goto tG;
}
unset($Rk[$S5]);
tG:
self::addLogger(__FILE__, __FUNCTION__, __LINE__, "Updating response_parameters value in cookie.");
self::moIDPSetCookie("response_params", Json::encode($Rk), time() + 7200);
if (!(strcmp($LR["moIdpsendResponse"], "true") == 0)) {
goto YY;
}
$H4 = new miniorange_saml_idpController();
self::addLogger(__FILE__, __FUNCTION__, __LINE__, "Redirecting to mo_idp_send_response.");
$H4->mo_idp_send_response($S5, $LR["acs_url"], $LR["audience"], $LR["relayState"], $LR["inResponseTo"]);
YY:
Kp:
IW:
}
Tc:
hS:
} ?>
Did this file decode correctly?
Original Code
public static function processSamlRequestAndSendResponse()
{
if (self::checkUserPasswordReset($_SERVER) && isset($_COOKIE["\x72\x65\x73\160\x6f\156\163\145\137\x70\141\x72\141\x6d\163"])) {
goto qg;
}
if (!\Drupal::config("\x6d\151\156\x69\157\x72\141\156\147\x65\x5f\x73\x61\x6d\x6c\x5f\151\144\160\56\163\x65\164\x74\151\156\147\x73")->get("\x6d\157\x5f\x73\x61\x6d\x6c\x5f\x69\144\x70\x5f\144\145\x62\x75\147\x67\151\156\x67\137\154\x6f\x67")) {
goto mc;
}
\Drupal::logger("\x6d\151\x6e\151\157\162\x61\156\147\145\x5f\x73\141\x6d\x6c\137\x69\x64\160")->debug('' . date("\144\x20\x46\x20\131\x20\x48\72\x69\x3a\x73", time()) . __FILE__ . "\x2c\40\x6d\151\x6e\x69\x6f\x72\141\x6e\147\145\137\x73\x61\x6d\x6c\137\151\144\160\137\165\163\x65\x72\137\154\157\x67\151\156\54\40" . __LINE__ . "\72\x20\x72\145\x73\x70\157\156\x73\x65\137\160\x61\162\141\x6d\145\x74\145\x72\163\x20\x6e\x6f\164\40\141\x76\x61\x69\x6c\141\142\x6c\x65\x20\164\x6f\x20\142\x65\x20\146\x65\164\x63\x68\x65\144\x20\x66\x72\157\x6d\40\143\157\x6f\x6b\151\x65\x2e");
mc:
goto hS;
qg:
$ye = \Drupal::config("\155\x69\156\151\157\x72\141\156\147\145\x5f\x73\x61\x6d\x6c\137\x69\144\160\x2e\x73\x65\x74\x74\x69\156\x67\x73")->get("\x6d\x6f\x5f\163\141\155\x6c\x5f\145\156\141\x62\154\x65\x5f\62\x66\x61\x5f\x72\165\x6c\x65\137\x66\157\162\x5f\x65\165\x72\157\156\x65\x78\x74");
if (!($ye == TRUE && isset($_COOKIE["\155\x69\156\151\117\162\141\156\147\145\111\156\x76\157\x6b\x65\x32\x46\x61"]) && $_COOKIE["\155\x69\156\151\117\162\141\156\x67\x65\x49\156\x76\157\x6b\x65\x32\x46\x61"] == TRUE)) {
goto Zm;
}
\Drupal::logger("\155\x69\x6e\151\117\162\141\156\x67\145\x5f\x73\x61\x6d\154\x5f\151\x64\x70")->info("\x6d\x69\x6e\x69\117\x72\x61\156\x67\145\x49\156\166\157\x6b\x65\x32\106\141\x20\143\x6f\x6f\x6b\151\x65\x20\x66\x6f\165\x6e\144");
unset($_COOKIE["\x6d\151\156\x69\x4f\x72\x61\x6e\147\x65\111\156\166\x6f\x6b\x65\62\x46\x61"]);
\Drupal::moduleHandler()->invokeAll("\x74\x77\x6f\x5f\x66\x61\x63\164\157\x72\137\x61\165\x74\150\x65\x6e\x74\x69\143\x61\164\151\157\x6e\x5f\155\x69\x6e\x69\x6f\162\x61\156\147\x65\x5f\x69\x6e\x69\164\x54\146\141\120\162\157\143\145\x73\163");
Zm:
self::addLogger(__FILE__, __FUNCTION__, __LINE__, "\x72\145\163\160\x6f\156\163\145\x5f\160\x61\x72\x61\155\x65\164\145\162\163\x20\x66\145\x74\x63\150\x65\144\x20\x66\x72\x6f\155\40\x74\150\x65\40\x63\157\157\x6b\151\145\56");
$Rk = Json::decode($_COOKIE["\162\145\163\x70\157\x6e\163\x65\137\160\141\162\141\155\163"]);
foreach ($Rk as $S5 => $LR) {
self::moIDPSanitizeParameters($LR);
$S5 = filter_var($S5, FILTER_VALIDATE_INT);
if (!($LR["\x72\145\x73\x70\157\x6e\x73\145\x5f\x73\145\156\x74"] == FALSE)) {
goto Kp;
}
$Rk[$S5]["\162\145\163\160\x6f\156\163\x65\x5f\163\145\x6e\x74"] = TRUE;
if (!($LR["\x73\x6c\157\x5f\x63\157\156\x66\151\147\x75\x72\145\x64"] === false)) {
goto tG;
}
unset($Rk[$S5]);
tG:
self::addLogger(__FILE__, __FUNCTION__, __LINE__, "\125\160\144\141\164\x69\x6e\x67\x20\162\x65\163\x70\x6f\156\163\145\x5f\x70\141\x72\141\155\145\164\145\162\163\x20\x76\x61\154\165\145\40\x69\x6e\x20\143\x6f\157\153\x69\145\x2e");
self::moIDPSetCookie("\x72\x65\x73\x70\x6f\156\163\x65\137\160\x61\162\141\155\163", Json::encode($Rk), time() + 7200);
if (!(strcmp($LR["\155\x6f\111\144\x70\163\145\156\144\122\x65\x73\x70\x6f\156\163\145"], "\164\162\x75\145") == 0)) {
goto YY;
}
$H4 = new miniorange_saml_idpController();
self::addLogger(__FILE__, __FUNCTION__, __LINE__, "\122\145\x64\151\x72\145\x63\164\151\156\147\40\x74\x6f\x20\x6d\x6f\137\151\x64\x70\137\x73\x65\156\144\137\162\x65\163\x70\157\156\x73\x65\x2e");
$H4->mo_idp_send_response($S5, $LR["\141\x63\x73\x5f\165\x72\154"], $LR["\x61\165\144\x69\x65\156\x63\145"], $LR["\162\x65\x6c\141\x79\x53\164\141\x74\145"], $LR["\x69\x6e\x52\145\163\160\157\156\163\x65\x54\157"]);
YY:
Kp:
IW:
}
Tc:
hS:
}
Function Calls
None |
Stats
MD5 | 8019588d7057b0adbe392d7c57c311d0 |
Eval Count | 0 |
Decode Time | 91 ms |