From 57423e206f26f4c18554d6d188e098b04e86ea6b Mon Sep 17 00:00:00 2001 From: GPUCode Date: Tue, 11 Jul 2023 01:18:55 +0300 Subject: [PATCH] Fix typo --- src/core/loader/ncch.cpp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/core/loader/ncch.cpp b/src/core/loader/ncch.cpp index bbc025cc..c1ce1b98 100644 --- a/src/core/loader/ncch.cpp +++ b/src/core/loader/ncch.cpp @@ -112,7 +112,7 @@ bool NCCH::loadFromHeader(Crypto::AESEngine &aesEngine, IOFile& file, const FSIn // It seems like some decryption tools will decrypt the file, without actually setting the NoCrypto flag in the NCCH header // This is a nice and easy hack to see if a file is pretending to be encrypted, taken from 3DMoo and Citra if (u32(programID) == u32(jumpID) && encrypted) { - printf("NCSD is supposedly ecrypted but not actually encrypted\n"); + printf("NCSD is supposedly encrypted but not actually encrypted\n"); encrypted = false; // Cartridge is not actually encrypted, set all of our encryption info structures to nullopt @@ -312,4 +312,4 @@ std::pair NCCH::readFromFile(IOFile& file, const FSInfo &info } return { success, bytes}; -} \ No newline at end of file +}