-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NPE in zelix.StringEncryptionTransformer #14
Comments
Right. I seem to have forgotten to add a nullcheck. That portion of the transformer is pretty volatile hence the fixme note |
Unfortunately, it would appear that specific bytecode patterns used is different here. Because of how volatile the transformer is there's really no point in expanding it to handle every edge case. Instead, I'd rather create a catch-all (see MethodAnalyzer) which can adapt to different variations of this obfuscation in general |
I encountered same problem:
|
#121 fixes this. |
Could this even work at all? In https://github.com/java-deobfuscator/deobfuscator/blob/master/src/main/java/com/javadeobfuscator/deobfuscator/transformers/zelix/StringEncryptionTransformer.java#L78 the
while
is left due tonext == null
, so callingnext.getNext()
in https://github.com/java-deobfuscator/deobfuscator/blob/master/src/main/java/com/javadeobfuscator/deobfuscator/transformers/zelix/StringEncryptionTransformer.java#L89 fails.The text was updated successfully, but these errors were encountered: