• Stars
    star
    131
  • Rank 266,133 (Top 6 %)
  • Language
    HTML
  • Created over 13 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

IOCCC International Obfuscated C code contest entries

The International Obfuscated C Code Contest

Copyright (c) Landon Curt Noll, Simon Cooper, Peter Seebach and Leonid A. Broukhis, 2001-2009. All Rights Reserved. Permission for personal, educational or non-profit use is granted provided this this copyright and notice are included in its entirety and remains unaltered. All other uses must receive prior permission from the contest judges.

Obfuscate:  tr.v.  -cated, -cating, -cates.  1. a.  To render obscure.
    b.  To darken.  2. To confuse:  Their emotions obfuscated their
    judgment.  [LLat. obfuscare, to darken : ob(intensive) +
    Lat. fuscare, to darken < fuscus, dark.] -obfuscation n.
    obfuscatory adj.

Last updated: Tue Jun 29 13:29:27 PDT 1999

The official IOCCC web site is:

http://www.ioccc.org

How it was started:

The original inspiration of the International Obfuscated C Code Contest came from the Bourne Shell source and the finger command as distributed in 4.2BSD. If this is what could result from what some people claim is reasonable programming practice, then to what depths might quality sink if people really tried to write poor code?

I put that question to the USENET news groups net.lang.c and net.unix-wizards in the form of a contest. I selected a form similar to the contest (Bulwer-Lytton) that asks people to create the worst opening line to a novel. (that contest in turn was inspired by disgust over a novel that opened with the line "It was a dark and stormy night.") The rules were simple: write, in 512 bytes or less, the worst complete C program.

Thru the contest I have tried to instill two things in people. First is a disgust for poor coding style. Second was the notion of just how much utility is lost when a program is written in an unstructured fashion. Contest winners help do this by what I call satirical programming. To see why, observe one of the definitions of satire:

Keen or energetic activity of the mind used for the purpose
of exposing and discrediting vice or folly.

The authors of the winning entries placed a great deal of thought into their programs. These programs in turn exposed and discredited what I considered to be the programmer's equivalent of "vice or folly".

There were two unexpected benefits that came from the contest winners. First was an educational value to the programs. To understand these C programs is to understand subtle points of the C programming language. The second benefit is the entertainment value, which should become evident as you read further!

Suggestions on how to understand the winning entries:

You are strongly urged to try to determine what each program will produce by visual inspection. Often this is an impossible task, but the difficulty that you encounter should give you more appreciation for the entry.

If you have the energy to type in the text, or if you have access to a machine readable version of these programs, you should next consider some preprocessing such as:

sed -e '/^#.*include/d' program.c | cc -E

This strips away comments and expands the program's macros without having things such as <stdio.h> macros clutter up the output. If the entry requires or suggests the use of compile line options (such as -Dindex=strchr) they should be added after the '-E' flag.

The next stage towards understanding is to use a C beautifier or C indenting program on the source. Be warned that a number of these entries are so twisted that such tools may abort or become very confused. You may need to help out by doing some initial formatting with an editor. You might also try renaming variables and labels to give more meaningful names.

Now try linting the program. You may be surprised at how little lint complains about these programs. Pay careful attention to messages about unused variables, wrong types, pointer conversions, etc. But be careful, some lints produce incorrect error messages or even abort! Your lint may detect syntax errors in the source. See the next paragraph for suggestions on how to deal with this.

When you get to the stage where you are ready to compile the program examine the compilation comments above each entry. A simple define or edit may be required due to differing semantics between operating systems. If you are able to successfully compile the program, experiment with it by giving it different arguments or input. You may also use the makefile provided to compile the program. Keep in mind that C compilers often have bugs, or features which result the program failing to compile. You may have to do some syntax changing as we did to get old programs to compile on strict ANSI C compilers.

Last, read the judges' comments/spoilers on the program. Hints for foo.c are given in foo.hint. Often they will contain suggested arguments or recommended data to use.

If you do gain some understanding of how a program works, go back to the source and reexamine it using some of the techniques outlined above. See if you can convince yourself of why the program does what it does.

Regarding the source archive:

Each sub-directory contains all the entries for a single year. Often the file names match one of the last names of the author. Judges' hints are given in files of the form *.hint.

You may need to tweak the Makefile to get everything to compile correctly. Read the hint files for suggestions.

The rules for a given year are given in the file named rules. Each archive contains a copy of the rules for the upcoming contest.

The following URL is the official archive of the winning entries:

http://www.ioccc.org/years.html

Regarding the distribution of sources:

All contest results are in the public domain. We do ask that you observe the following request:

You may share these files with others, but please do not prevent them of doing the same. If some of these files and/or contest entries are published in printed form, or if you use them in a business or classroom setting, please let us know. We ask that you drop a line to the 'judges' EMail box. See the following page for instructions on how to send us a message,

http://www.ioccc.org/contact.html

Some final things to remember:

While the idea for the contests has remained the same through the years, the contest rules and guidelines vary. What was novel one year may be considered common the next. The categories for awards differ because they are determined after the judges examine all of the entries.

The judges' hints assume that the program resides in a file with the same username as the author. Where there is more than one author, the first named author is used.

Some C compilers are unable to compile some of these programs. The judges tried to select programs that were widely portable and compilable, but did not always succeed. As of 1990, and entry may use both K&R and ANSI C compilers. Makefiles for both types of C compilers are used. See the contest rules for details.

You are strongly encouraged to read the new contest rules before sending any entries. The rules, and sometimes the contest Email address itself, change from time to time. A valid entry one year may be rejected in a later year due to changes in the rules. See:

http://www.ioccc.org/index.html#enter

for up to date information on how to enter.

Last, PLEASE don't code in the style of these programs It is hoped that you will gain an understanding that poor style destroys an otherwise correct program. Real programmers don't write obfuscated programs, unless they are submitting a contest entry! :-)

Happy pondering!

More Repositories

1

monsterwm

tiny but monstrous tiling window manager
C
331
star
2

Fractal-Image-Compression

A Fractal Image Compression System
Java
41
star
3

dotfiles

/home/cookies configurations
Perl
36
star
4

iii

POSIX sh frontend to iim or ii
Shell
30
star
5

iibot

a bot based on [suckless] ii, auto-managed by bash
Shell
28
star
6

iim

ii improved - minimalist FIFO and filesystem-based IRC client inspired by suckless ii
C
25
star
7

Pancakes

Interactive IRC bot and logger in pure Bash
Shell
16
star
8

Othello

the classic abstract strategy game
Java
13
star
9

scripts

scripts and workarounds
Ruby
12
star
10

wm

ɯm - fully dynamic tag-based window manager built upon XCB
C
10
star
11

bgs

simple background setter
C
10
star
12

mstatusbar

monsterwm output parser and info collector
C
9
star
13

niii

ncurses frontend to ii similar to iii
C
9
star
14

mopag

monsterwm-pager - slim bar to show #desktops and #windows per desktop
C
9
star
15

rtf2latex2e

translate RTF files into LaTeX files
C
8
star
16

c00kiemon5ter.github.com

personal blog
CSS
8
star
17

LuceneEval

A library and application built on top of Lucene, using trec_eval to evaluate querries for the cacm collection
Java
8
star
18

zipf

Zipf's Law in the Greek language
Shell
7
star
19

vim

personal vim configuration and setup
Vim Script
5
star
20

etc.conf

global configuration files mainly from /etc
5
star
21

Graphs

Finding diameter and strong coherent components in directed graphs
Java
5
star
22

cookies_samesite_compat

WSGI Middleware to preserve compatibility regarding cookies with the SameSite attribute
Python
5
star
23

tsoukalas

Σχολή Οδηγών Τσουκαλάς Πάναγιώτης - Driving school webpage
JavaScript
5
star
24

PKGBUILDs

[AUR] ArchLinux User Repository packages I maintain and contribute to
Shell
4
star
25

NumericalAnalysis

Numerical Analysis Class
Scilab
4
star
26

presentation-skeleton

Skeleton for presentations
JavaScript
3
star
27

SentSep

a simple sentence seperator / splitter / segmentation / boundary disambiguation
Java
3
star
28

dotfiles-1

3
star
29

WorldOfWumpus

a basic implementation of World of Wumpus game
Java
3
star
30

MipsAssembly

experimental mips assembly language scripts
3
star
31

LuceneApp

a quick app to run queries on an index of documents
Java
3
star
32

gentoo

some conf files from gentoo
3
star
33

MIPSnbit

A nbit Mips processor implementation
VHDL
3
star
34

presentation-tnc19-identitypython-eduteams

Presentation for TNC19 - IdentityPython and eduTEAMS
JavaScript
3
star
35

md-sign

Script to (re)sign SAML metadata
Python
2
star
36

JKruskal

[Abandonded] kruskal minimum spanning tree in practice
Java
2
star
37

apple-client-secret

Generate a client_secret for Apple Sign-in
Python
2
star
38

docker-satosa

Docker image for SATOSA.
Python
2
star
39

presentation-eosc19-identitypython-satosa

Presentation for the EOSC meeting Oct.2019 at AMS - IdentityPython and SATOSA
JavaScript
1
star
40

presentation-tiime2020-idpy-governance

Presentation for TIIME 2020 - IdPy Governance
HTML
1
star
41

presentation-ntw19-identitypython-satosa-demo

Presentation for NTW19 - IdentityPython and SATOSA
JavaScript
1
star