Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- __int64 __fastcall xxtea_decrypt(__int64 a1, __int64 a2, const void *a3, __int64 a4)
- {
- __int64 result; // x0
- bool v5; // [xsp+Ch] [xbp-44h]
- unsigned __int64 i; // [xsp+10h] [xbp-40h]
- unsigned __int64 j; // [xsp+10h] [xbp-40h]
- char v11[16]; // [xsp+38h] [xbp-18h] BYREF
- __int64 v12; // [xsp+48h] [xbp-8h]
- v12 = *(_QWORD *)(_ReadStatusReg(ARM64_SYSREG(3, 3, 13, 0, 2)) + 40);
- memcpy(v11, a3, sizeof(v11));
- for ( i = 0LL; ; ++i )
- {
- v5 = 0;
- if ( i < 0x10 )
- v5 = v11[i] != 0;
- if ( !v5 )
- break;
- }
- for ( j = i + 1; j < 0x10; ++j )
- v11[j] = 0;
- result = sub_C85A7C(a1, a2, v11, a4);
- _ReadStatusReg(ARM64_SYSREG(3, 3, 13, 0, 2));
- return result;
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement