diff --git a/src/unlocker/spoofing.cpp b/src/unlocker/spoofing.cpp index 58fd450..09c9eca 100644 --- a/src/unlocker/spoofing.cpp +++ b/src/unlocker/spoofing.cpp @@ -305,7 +305,6 @@ void Spoofer::modifyCharacterData(json& js) } } else - { if (js.value("isEntitled", false) == false) return; } @@ -330,7 +329,7 @@ void Spoofer::modifyCharacterData(json& js) for (auto& item : js["characterItems"]) { - /* + /* set existing items to rnd number */ if (item.contains("itemId") && item["itemId"].is_string()) diff --git a/src/unlocker/ssl.cpp b/src/unlocker/ssl.cpp index d3c825d..50e81fd 100644 --- a/src/unlocker/ssl.cpp +++ b/src/unlocker/ssl.cpp @@ -78,7 +78,6 @@ bool CertManager::loadCA() if (!keyBio) return false; _caPkey = PEM_read_bio_PrivateKey(keyBio.get(), nullptr, nullptr, nullptr); - BIO_ptr certBio(BIO_new_file((path + "/cert.pem").c_str(), "r")); if (!certBio) return false; _caCert = PEM_read_bio_X509(certBio.get(), nullptr, nullptr, nullptr); @@ -106,8 +105,7 @@ void CertManager::installCert(X509* cert) HCERTSTORE rootStore = CertOpenStore(CERT_STORE_PROV_SYSTEM, 0, NULL, CERT_SYSTEM_STORE_CURRENT_USER, L"Root"); if (rootStore) { - BOOL success = - CertAddCertificateContextToStore(rootStore, certCtx, CERT_STORE_ADD_REPLACE_EXISTING, NULL); + BOOL success = CertAddCertificateContextToStore(rootStore, certCtx, CERT_STORE_ADD_REPLACE_EXISTING, NULL); if (success) Log::info("CA certificate installed"); diff --git a/src/unlocker/utils.h b/src/unlocker/utils.h index 4c821a9..242e514 100644 --- a/src/unlocker/utils.h +++ b/src/unlocker/utils.h @@ -6,4 +6,4 @@ namespace utils { std::string getExePath(); std::string randomizeString(size_t length); -} \ No newline at end of file +} // namespace utils \ No newline at end of file