@@ -429,15 +429,14 @@ namespace details {
429
429
HMODULE hModule = nullptr , hNtdll = GetModuleHandleW (L" ntdll.dll" );
430
430
auto NtdllHeaders = reinterpret_cast <PIMAGE_NT_HEADERS>(RtlImageNtHeader (hNtdll));
431
431
PIMAGE_NT_HEADERS ModuleHeaders = nullptr ;
432
- _RTL_INVERTED_FUNCTION_TABLE_ENTRY_WIN7_32 entry{ };
432
+ _RTL_INVERTED_FUNCTION_TABLE_ENTRY_WIN7_32 entry = { 0 };
433
433
RtlSecureZeroMemory (&entry, sizeof (entry));
434
434
LPCSTR lpSectionName = " .data" ;
435
- SEARCH_CONTEXT SearchContext{
436
- };
435
+ SEARCH_CONTEXT SearchContext = { 0 };
437
436
SearchContext.SearchPattern = reinterpret_cast <LPBYTE>(&entry);
438
437
SearchContext.PatternSize = sizeof (entry);
439
438
PLIST_ENTRY ListHead = &NtCurrentPeb ()->Ldr ->InMemoryOrderModuleList ,
440
- ListEntry = ListHead->Flink ;
439
+ ListEntry = ListHead->Flink ;
441
440
PLDR_DATA_TABLE_ENTRY CurEntry = nullptr ;
442
441
DWORD SEHTable, SEHCount;
443
442
BYTE Offset = 0x20 ; // sizeof(_RTL_INVERTED_FUNCTION_TABLE_ENTRY)*2
@@ -471,7 +470,7 @@ namespace details {
471
470
entry.SEHandlerCount = SEHCount;
472
471
473
472
while (NT_SUCCESS (RtlFindMemoryBlockFromModuleSection (hNtdll, lpSectionName, &SearchContext))) {
474
- PRTL_INVERTED_FUNCTION_TABLE_WIN7_32 tab = decltype (tab)(SearchContext.Result - Offset);
473
+ PRTL_INVERTED_FUNCTION_TABLE_WIN7_32 tab = reinterpret_cast < decltype (tab)> (SearchContext.Result - Offset);
475
474
476
475
// Note: Same memory layout for RTL_INVERTED_FUNCTION_TABLE_ENTRY in Windows 10 x86 and x64.
477
476
if (RtlIsWindowsVersionOrGreater (6 , 2 , 0 ) && tab->MaxCount == 0x200 && !tab->NextEntrySEHandlerTableEncoded ) return tab;
@@ -523,7 +522,7 @@ namespace details {
523
522
524
523
#else
525
524
DWORD ptr = 0 , count = 0 ;
526
- bool IsWin8OrGreater = RtlIsWindowsVersionOrGreater (6 , 2 , 0 );
525
+ BOOL IsWin8OrGreater = RtlIsWindowsVersionOrGreater (6 , 2 , 0 );
527
526
ULONG Index = IsWin8OrGreater ? 1 : 0 ;
528
527
529
528
if (InvertedTable->Count == InvertedTable->MaxCount ) {
0 commit comments