mirror of
https://github.com/kwsch/PKHeX
synced 2024-11-27 22:40:22 +00:00
Copy identification bytes from the correct offset
directly after the AESMAC not well after ;)
This commit is contained in:
parent
f73b6a668c
commit
0a37458c0a
1 changed files with 1 additions and 1 deletions
|
@ -559,7 +559,7 @@ namespace PKHeX
|
|||
// Detection of stored Decryption XORpads:
|
||||
if (ModifierKeys != Keys.Control) // Allow bypass via control key.
|
||||
{
|
||||
byte[] savID = new byte[0x10]; Array.Copy(input, 0x20, savID, 0, 0x10);
|
||||
byte[] savID = new byte[0x10]; Array.Copy(input, 0x10, savID, 0, 0x10);
|
||||
ulong ident = BitConverter.ToUInt64(savID, 0x0);
|
||||
string exepath = System.Windows.Forms.Application.StartupPath;
|
||||
string checkpath = exepath.Clone().ToString();
|
||||
|
|
Loading…
Reference in a new issue