Closed rfalke closed 1 year ago
Reko now produces:
void fn00011050()
{
char bLoc1A;
fn000113A0();
puts("IOLI Crackme Level 0x00");
printf("Password: ");
scanf("%s", &bLoc1A);
if (strcmp(&bLoc1A, "250382") != 0x00)
puts("Invalid Password!");
else
puts("Password OK :)");
}
Note how the compiler has converted the parameterless, \n
-terminated calls to printf
to equivalent calls to puts
. It's not possible for Reko or any other decompiler to undo this conversion without serious oracular knowledge.
The crack-me https://github.com/rfalke/decompiler-subjects/tree/master/from_internet/ioli_crackmes/crackme0x00 is available in 3 binaries. Reko (0.11.4.0-931ca7d) only outputs the real main for ia32_elf and ia32_pe but not for arm_pe.
Expected output: