* rs-client: name SpriteBuffer * rs-client: (re)name spritebuffer methods * rs-client/deob: Add missed @Export's, make updatemappings fix this next time * rs-client: run intellij redundant else inspection * rs-client: invert some script interpreter if's * deob: checkstyle fixes * rs-client: SpriteBuffer_loadSprite -> SpriteBuffer_bufferFile
108 lines
2.2 KiB
Java
108 lines
2.2 KiB
Java
import net.runelite.mapping.Export;
|
|
import net.runelite.mapping.Implements;
|
|
import net.runelite.mapping.ObfuscatedGetter;
|
|
import net.runelite.mapping.ObfuscatedName;
|
|
import net.runelite.mapping.ObfuscatedSignature;
|
|
|
|
@ObfuscatedName("ik")
|
|
@Implements("VarpDefinition")
|
|
public class VarpDefinition extends DualNode {
|
|
@ObfuscatedName("q")
|
|
@ObfuscatedSignature(
|
|
signature = "Lhp;"
|
|
)
|
|
@Export("VarpDefinition_archive")
|
|
static AbstractArchive VarpDefinition_archive;
|
|
@ObfuscatedName("w")
|
|
@ObfuscatedGetter(
|
|
intValue = -2051999343
|
|
)
|
|
@Export("VarpDefinition_fileCount")
|
|
public static int VarpDefinition_fileCount;
|
|
@ObfuscatedName("e")
|
|
@ObfuscatedSignature(
|
|
signature = "Lel;"
|
|
)
|
|
@Export("VarpDefinition_cached")
|
|
static EvictingDualNodeHashTable VarpDefinition_cached;
|
|
@ObfuscatedName("l")
|
|
@ObfuscatedSignature(
|
|
signature = "Llx;"
|
|
)
|
|
@Export("titlebuttonSprite")
|
|
static IndexedSprite titlebuttonSprite;
|
|
@ObfuscatedName("y")
|
|
@ObfuscatedSignature(
|
|
signature = "Lkf;"
|
|
)
|
|
@Export("NetCache_responseArchiveBuffer")
|
|
static Buffer NetCache_responseArchiveBuffer;
|
|
@ObfuscatedName("p")
|
|
@ObfuscatedGetter(
|
|
intValue = 1809591211
|
|
)
|
|
@Export("type")
|
|
public int type;
|
|
|
|
static {
|
|
VarpDefinition_cached = new EvictingDualNodeHashTable(64);
|
|
}
|
|
|
|
VarpDefinition() {
|
|
this.type = 0;
|
|
}
|
|
|
|
@ObfuscatedName("e")
|
|
@ObfuscatedSignature(
|
|
signature = "(Lkf;I)V",
|
|
garbageValue = "-927981442"
|
|
)
|
|
@Export("decode")
|
|
void decode(Buffer var1) {
|
|
while (true) {
|
|
int var2 = var1.readUnsignedByte();
|
|
if (var2 == 0) {
|
|
return;
|
|
}
|
|
|
|
this.decodeNext(var1, var2);
|
|
}
|
|
}
|
|
|
|
@ObfuscatedName("p")
|
|
@ObfuscatedSignature(
|
|
signature = "(Lkf;II)V",
|
|
garbageValue = "-1780799047"
|
|
)
|
|
@Export("decodeNext")
|
|
void decodeNext(Buffer var1, int var2) {
|
|
if (var2 == 5) {
|
|
this.type = var1.readUnsignedShort();
|
|
}
|
|
|
|
}
|
|
|
|
@ObfuscatedName("w")
|
|
@ObfuscatedSignature(
|
|
signature = "(CI)Z",
|
|
garbageValue = "-17259877"
|
|
)
|
|
public static boolean method4366(char var0) {
|
|
if ((var0 <= 0 || var0 >= 128) && (var0 < 160 || var0 > 255)) {
|
|
if (var0 != 0) {
|
|
char[] var1 = class288.cp1252AsciiExtension;
|
|
|
|
for (int var2 = 0; var2 < var1.length; ++var2) {
|
|
char var3 = var1[var2];
|
|
if (var0 == var3) {
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
}
|