On Fri, 2009-08-07 at 13:20 -0400, Charles Gregory wrote:

> > > > char 
> > > > *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
> > > > main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? 
> > > > c<<=1:
> > > > (c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ 
> > > > putchar(t[s]);h=m;s=0; }}}
> > > 
> > > How did you get line noise from your modem to look so much like perl 
> > > code? :-)
> > 
> > The trick is, to catch a chunk that actually is valid C code. ;)
> 
> Okay, so now I'm curious. What *IS* that chunk of code?

It is my signature. ;-)

More seriously, it is some obfuscated C code I wrote way back for fun.
Compiles cleanly. It implements a well-known algorithm, though quite
bare-bones with some constraints.

I won't mention the algorithm's name, though, not in public. Spoils the
fun for those who likes puzzles. ;)


-- 
char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to