It decodes to this:
<?php
require("../library/settings_class.php");
require("admin_product_class.php");
require("admin_category_class.php");
require("admin_settings_class.php");
require("admin_attributes_class.php");
require("admin_coupon_class.php");
require("admin_regions_class.php");
require("admin_orders_class.php");
require("admin_gateway_class.php");
require("../library/order_handler.php");
require("../library/category_class.php");
require("../library/products_class.php");
require("../library/cart_class.php");
require("../library/checkout_class.php");
require("../library/payment_class.php");
require("admin_functions_class.php");
require("admin_content_class.php");
if(!zogo_get_settings("language")){
$zogo_language="english";
}
else
{
$zogo_language=zogo_get_settings("language");
}
include("../languages/".$zogo_language.".php");
?>
The code you presented is an obfuscation technique designed to keep amateurs from reading someone's code. They took some code, encoded it, and took the resulting code and encoded it again.
I presume you are trying to convert someone's code? You can use the code above... it will do the same thing.
As I decoded each layer, I changed "eval" to "print". This way, instead of EXECUTING the code, I could SEE the result first. This is very important. It's possible that the code might have contained something that would erase or modify files on my hard drive. Fortunately, in this case, that didn't happen... but it could have.
This should serve as a warning to any other readers on this forum... if someone says, "Hey, I can't get the following code to work, try it on your machine.", don't assume that all PHP code is simply displaying a pretty web page. This could easily have done major damage.