Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php /** *<INFO > Generated by MyPhpGuard 1.5.0.0 Date:05/05/2014 10:19:04 a.m.</INFO..

Decoded Output download

<?php  
/** 
 *<INFO > Generated by MyPhpGuard 1.5.0.0 Date:05/05/2014 10:19:04 a.m.</INFO > 
 * 
 * @author       
 * @copyright     
 * @license      
 * @version     
 * @link    
 *       
 */ 
?> 
<?php  
 class SWIFT_DewakCommonJira extends SWIFT_Library 
{ private $y = NULL; private $c = NULL;public function __construct(){parent::__construct(); 
$o = array(	0=>2, 
1=>4, 
2=>8, 
3=>16, 
4=>32, 
5=>64, 
6=>128 
);$e = mt_rand(0,6);$this->separator = $o[$e];return true;}public function __destruct(){parent::__destruct();return true; 
}public function set_key($o) {$this->password = $o;}public function decryptXor($o, $e = 16) {$o = base64_decode($o);$p = strlen($o); 
$eo = $e;$ee = "";$ep = substr($this->password ^ substr($o, 0, $e), 0, 512);while($eo < $p) {$oo = substr($o, $eo, 16);$ee .= $oo ^ pack("H*", sha1($ep)); 
$ep = substr($oo . $ep, 0, 512) ^ $this->password;$eo += 16;}return stripslashes(preg_replace("/*$/", "", $ee)); 
}private function k(){$o = array();$e = "abcdefghijklmnpqrstuvwxyzABCDEFGHIJKLMNPQRSTUVWXYZ123456789"; 
srand((double) microtime() * 1000000);$p = "";for($eo = 0; $eo < 256; $eo++){$p = $p . substr($e, rand() % strlen($e), 1); 
if(strlen($p) == $this->separator){$o[] = $p;$p = "";}}return implode(";",$o);}private function m($o) {$e = "";while($o-- > 0) { 
$e .= chr(mt_rand() & 0xff);}return $e;}private function f($o){$e = explode(";",$o);$p = strlen($e[0]);$eo = (256/$p)-1; 
$ee = substr($o,0,(256+$eo));$this->set_key($ee);$ep = substr($o,257+$eo,strlen($o));$oo = $this->decryptXor($ep);$oe = unserialize($oo); 
return $oe;}private function n($o){$e = getcwd()."/".SWIFT_APPSDIRECTORY."/".$o."/";$p = false;$eo = $e."dwk_key.php"; 
if(file_exists($eo)){$p = true;}return $p;}private function i($o){$e = getcwd()."/".SWIFT_APPSDIRECTORY."/".$o."/"; 
$p = "";$eo = $e."dwk_key.php";if(file_exists($eo)){$ee = fopen($eo, "r");if($ee){$p = fread($ee, 5038); 
fclose($ee);}$p = str_replace("<?php //", "", $p);$p = trim(str_replace("?>", "", $p));return $p;}else { 
return "The Key file does not exist, please contact Dewak "; 
}}private function h(){$o = "http" . ((!empty($_SERVER["HTTPS"])) ? "s" : "") . "://".$_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"]; 
return $o;}public function CheckKeyInfo($o, $e){$p = "";$eo = $this->n($e);if(!$eo){return $p = "The Key file doesn't exist, please contact Dewak"; 
}$ee = $this->i($e);if(!empty($ee)){$ep = $this->f($ee);if(is_array($ep)){if($o == $ep["dewak_product"]){ 
$oo = parse_url($this->h());$oe = str_replace("www.","",$oo["host"]);if(in_array($oe,$ep["domains"])){ 
if($ep["expiration_date"] == 0){$p = "success";}else {if($ep["expiration_date"] >= DATENOW){ 
$p = "success";}else {$p = "You reach your expiration date: Today: ".SWIFT_Date::Get(SWIFT_Date::TYPE_DATETIME, DATENOW). " - Expiration Date: ".SWIFT_Date::Get(SWIFT_Date::TYPE_DATETIME, $ep["expiration_date"]); 
}}}else {$p = "Domain Problem With Key: The key file have a different domain, please replace your key file"; 
}}else {$p = "Incorrect Key for this product: Please replace your key file"; 
}}else {$p = "Incorrect Key: no valid information on the Key file"; 
}}return $p;}public function CheckExpirationDate($o, $e){$p = false;if(!$this->n($o)){return $p;}$eo = $this->i($o);if(!empty($eo)){ 
$ee = $this->f($eo);if(is_array($ee)){if($e == $ee["dewak_product"]){$ep = parse_url($this->h()); 
$oo = str_replace("www.","",$ep["host"]);if(in_array($oo,$ee["domains"])){if($ee["expiration_date"] == 0){ 
$p = true;}else {if($ee["expiration_date"] >= DATENOW){$p = true;}}}}}}return $p;}} 
?> 

Did this file decode correctly?

Original Code

<?php 
/**
 *<INFO > Generated by MyPhpGuard 1.5.0.0 Date:05/05/2014 10:19:04 a.m.</INFO >
 *
 * @author      
 * @copyright    
 * @license     
 * @version    
 * @link   
 *      
 */
?>
<?php 
 class SWIFT_DewakCommonJira extends SWIFT_Library
{ private $y = NULL; private $c = NULL;public function __construct(){parent::__construct();
$o = array(	0=>2,
1=>4,
2=>8,
3=>16,
4=>32,
5=>64,
6=>128
);$e = mt_rand(0,6);$this->separator = $o[$e];return true;}public function __destruct(){parent::__destruct();return true;
}public function set_key($o) {$this->password = $o;}public function decryptXor($o, $e = 16) {$o = base64_decode($o);$p = strlen($o);
$eo = $e;$ee = "";$ep = substr($this->password ^ substr($o, 0, $e), 0, 512);while($eo < $p) {$oo = substr($o, $eo, 16);$ee .= $oo ^ pack("\x48\x2a", sha1($ep));
$ep = substr($oo . $ep, 0, 512) ^ $this->password;$eo += 16;}return stripslashes(preg_replace("\x2f\x5c\x78\x31\x33\x5c\x78\x30\x30\x2a\x24\x2f", "", $ee));
}private function k(){$o = array();$e = "\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x50\x51\x52\x53\x54\x55\x56\x57\x58\x59\x5a\x31\x32\x33\x34\x35\x36\x37\x38\x39";
srand((double) microtime() * 1000000);$p = "";for($eo = 0; $eo < 256; $eo++){$p = $p . substr($e, rand() % strlen($e), 1);
if(strlen($p) == $this->separator){$o[] = $p;$p = "";}}return implode("\x3b",$o);}private function m($o) {$e = "";while($o-- > 0) {
$e .= chr(mt_rand() & 0xff);}return $e;}private function f($o){$e = explode("\x3b",$o);$p = strlen($e[0]);$eo = (256/$p)-1;
$ee = substr($o,0,(256+$eo));$this->set_key($ee);$ep = substr($o,257+$eo,strlen($o));$oo = $this->decryptXor($ep);$oe = unserialize($oo);
return $oe;}private function n($o){$e = getcwd()."\x2f".SWIFT_APPSDIRECTORY."\x2f".$o."\x2f";$p = false;$eo = $e."\x64\x77\x6b_\x6b\x65\x79.\x70\x68\x70";
if(file_exists($eo)){$p = true;}return $p;}private function i($o){$e = getcwd()."\x2f".SWIFT_APPSDIRECTORY."\x2f".$o."\x2f";
$p = "";$eo = $e."\x64\x77\x6b_\x6b\x65\x79.\x70\x68\x70";if(file_exists($eo)){$ee = fopen($eo, "\x72");if($ee){$p = fread($ee, 5038);
fclose($ee);}$p = str_replace("\x3c\x3f\x70h\x70\x20\x2f/", "", $p);$p = trim(str_replace("\x3f>", "", $p));return $p;}else {
return "\x54\x68\x65 \x4b\x65\x79 \x66\x69\x6c\x65 \x64\x6f\x65s\x20\x6e\x6ft\x20\x65x\x69\x73\x74\x2c\x20p\x6ce\x61s\x65 \x63o\x6e\x74a\x63t\x20D\x65\x77\x61\x6b ";
}}private function h(){$o = "\x68\x74\x74p" . ((!empty($_SERVER["\x48\x54\x54\x50\x53"])) ? "\x73" : "") . "\x3a\x2f\x2f".$_SERVER["\x53\x45\x52\x56\x45\x52\x5f\x4e\x41\x4d\x45"].$_SERVER["\x52\x45\x51\x55\x45\x53\x54\x5f\x55\x52\x49"];
return $o;}public function CheckKeyInfo($o, $e){$p = "";$eo = $this->n($e);if(!$eo){return $p = "\x54\x68\x65 \x4b\x65\x79 \x66\x69\x6c\x65 \x64\x6f\x65s\x6e\x27\x74 \x65\x78i\x73\x74\x2c\x20\x70l\x65a\x73e\x20c\x6fn\x74\x61c\x74 \x44e\x77\x61\x6b";
}$ee = $this->i($e);if(!empty($ee)){$ep = $this->f($ee);if(is_array($ep)){if($o == $ep["\x64\x65\x77a\x6b\x5f\x70r\x6f\x64\x75\x63t"]){
$oo = parse_url($this->h());$oe = str_replace("\x77\x77\x77.","",$oo["\x68\x6f\x73t"]);if(in_array($oe,$ep["\x64\x6f\x6da\x69\x6e\x73"])){
if($ep["\x65\x78\x70i\x72\x61\x74i\x6f\x6e\x5f\x64a\x74\x65"] == 0){$p = "\x73\x75\x63\x63\x65\x73\x73";}else {if($ep["\x65\x78\x70i\x72\x61\x74i\x6f\x6e\x5f\x64a\x74\x65"] >= DATENOW){
$p = "\x73\x75\x63\x63\x65\x73\x73";}else {$p = "\x59\x6f\x75\x20\x72\x65\x61\x63\x68\x20\x79\x6f\x75\x72\x20\x65\x78\x70\x69\x72\x61\x74\x69\x6f\x6e\x20\x64\x61\x74\x65\x3a\x20\x54\x6f\x64\x61\x79\x3a\x20".SWIFT_Date::Get(SWIFT_Date::TYPE_DATETIME, DATENOW). "\x20-\x20E\x78\x70\x69r\x61\x74\x69\x6fn\x20\x44\x61t\x65\x3a\x20".SWIFT_Date::Get(SWIFT_Date::TYPE_DATETIME, $ep["\x65\x78\x70i\x72\x61\x74i\x6f\x6e\x5f\x64a\x74\x65"]);
}}}else {$p = "\x44\x6f\x6d\x61\x69\x6e\x20\x50\x72\x6f\x62\x6c\x65\x6d\x20\x57\x69\x74\x68\x20\x4b\x65\x79\x3a\x20\x54\x68\x65\x20\x6b\x65\x79\x20\x66\x69\x6c\x65\x20\x68\x61\x76\x65\x20\x61\x20\x64\x69\x66\x66\x65\x72\x65\x6e\x74\x20\x64\x6f\x6d\x61\x69\x6e\x2c\x20\x70\x6c\x65\x61\x73\x65\x20\x72\x65\x70\x6c\x61\x63\x65\x20\x79\x6f\x75\x72\x20\x6b\x65\x79\x20\x66\x69\x6c\x65";
}}else {$p = "\x49\x6e\x63\x6f\x72\x72\x65\x63\x74\x20\x4b\x65\x79\x20\x66\x6f\x72\x20\x74\x68\x69\x73\x20\x70\x72\x6f\x64\x75\x63\x74\x3a\x20\x50\x6c\x65\x61\x73\x65\x20\x72\x65\x70\x6c\x61\x63\x65\x20\x79\x6f\x75\x72\x20\x6b\x65\x79\x20\x66\x69\x6c\x65";
}}else {$p = "\x49\x6e\x63\x6f\x72\x72\x65\x63\x74\x20\x4b\x65\x79\x3a\x20\x6e\x6f\x20\x76\x61\x6c\x69\x64\x20\x69\x6e\x66\x6f\x72\x6d\x61\x74\x69\x6f\x6e\x20\x6f\x6e\x20\x74\x68\x65\x20\x4b\x65\x79\x20\x66\x69\x6c\x65";
}}return $p;}public function CheckExpirationDate($o, $e){$p = false;if(!$this->n($o)){return $p;}$eo = $this->i($o);if(!empty($eo)){
$ee = $this->f($eo);if(is_array($ee)){if($e == $ee["\x64\x65\x77a\x6b\x5f\x70r\x6f\x64\x75\x63t"]){$ep = parse_url($this->h());
$oo = str_replace("\x77\x77\x77.","",$ep["\x68\x6f\x73t"]);if(in_array($oo,$ee["\x64\x6f\x6da\x69\x6e\x73"])){if($ee["\x65\x78\x70i\x72\x61\x74i\x6f\x6e\x5f\x64a\x74\x65"] == 0){
$p = true;}else {if($ee["\x65\x78\x70i\x72\x61\x74i\x6f\x6e\x5f\x64a\x74\x65"] >= DATENOW){$p = true;}}}}}}return $p;}}
?>

Function Calls

None

Variables

None

Stats

MD5 f7c380e67cd2b2d74a310dfc06898098
Eval Count 0
Decode Time 117 ms