tangled
alpha
login
or
join now
huwcampbell.com
/
reactos
0
fork
atom
Reactos
0
fork
atom
overview
issues
pulls
pipelines
[DLLS] Fix 64 bit issues
Timo Kreuzer
7 years ago
0f8439aa
6f130666
+88
-81
23 changed files
expand all
collapse all
unified
split
dll
cpl
sysdm
hardprof.c
directx
ksuser
ksuser.c
wine
d3dcompiler_43
utils.c
ntdll
ldr
ldrapi.c
ldrinit.c
win32
browseui
parsecmdline.cpp
fltlib
fltlib.c
message.c
iphlpapi
ifenum_reactos.c
kernel32
client
file
create.c
lfile.c
thread.c
lsasrv
authpackage.c
session.c
msafd
misc
dllmain.c
msafd.h
msgina
shutdown.c
mswsock
mswhelper.c
psapi
psapi.c
shimgvw
shimgvw.c
uxtheme
nonclient.c
wshtcpip
iflist.c
win32ss
gdi
gdi32
include
gdi32p.h
+1
-1
dll/cpl/sysdm/hardprof.c
···
567
567
L"PreferenceOrder",
568
568
NULL,
569
569
NULL,
570
570
-
(LPBYTE)pProfile->dwPreferenceOrder,
570
570
+
(LPBYTE)&pProfile->dwPreferenceOrder,
571
571
&dwSize);
572
572
if (lError == ERROR_SUCCESS)
573
573
{
+2
-2
dll/directx/ksuser/ksuser.c
···
20
20
PHANDLE phHandle)
21
21
{
22
22
NTSTATUS Status;
23
23
-
ULONG Length;
24
24
-
ULONG TotalSize;
23
23
+
SIZE_T Length;
24
24
+
SIZE_T TotalSize;
25
25
LPWSTR pStr;
26
26
UNICODE_STRING ObjectName;
27
27
OBJECT_ATTRIBUTES ObjectAttributes;
+1
-1
dll/directx/wine/d3dcompiler_43/utils.c
···
557
557
return S_OK;
558
558
}
559
559
560
560
-
HRESULT dxbc_init(struct dxbc *dxbc, UINT size)
560
560
+
HRESULT dxbc_init(struct dxbc *dxbc, DWORD size)
561
561
{
562
562
TRACE("dxbc %p, size %u.\n", dxbc, size);
563
563
+1
-1
dll/ntdll/ldr/ldrapi.c
···
124
124
125
125
/* Validate the cookie */
126
126
if ((Cookie & 0xF0000000) ||
127
127
-
((Cookie >> 16) ^ ((ULONG)(NtCurrentTeb()->RealClientId.UniqueThread) & 0xFFF)))
127
127
+
((Cookie >> 16) ^ (HandleToUlong(NtCurrentTeb()->RealClientId.UniqueThread) & 0xFFF)))
128
128
{
129
129
DPRINT1("LdrUnlockLoaderLock() called with an invalid cookie!\n");
130
130
+3
-3
dll/ntdll/ldr/ldrinit.c
···
136
136
if (NT_SUCCESS(Status))
137
137
{
138
138
/* Write the key handle */
139
139
-
if (_InterlockedCompareExchange((LONG*)RootKeyLocation, (LONG)RootKey, 0) != 0)
139
139
+
if (InterlockedCompareExchangePointer(RootKeyLocation, RootKey, NULL) != NULL)
140
140
{
141
141
/* Someone already opened it, use it instead */
142
142
NtClose(RootKey);
···
460
460
NtQueryPerformanceCounter(&Counter, NULL);
461
461
462
462
NewCookie = Counter.LowPart ^ Counter.HighPart;
463
463
-
NewCookie ^= (ULONG)NtCurrentTeb()->ClientId.UniqueProcess;
464
464
-
NewCookie ^= (ULONG)NtCurrentTeb()->ClientId.UniqueThread;
463
463
+
NewCookie ^= (ULONG_PTR)NtCurrentTeb()->ClientId.UniqueProcess;
464
464
+
NewCookie ^= (ULONG_PTR)NtCurrentTeb()->ClientId.UniqueThread;
465
465
466
466
/* Loop like it's done in KeQueryTickCount(). We don't want to call it directly. */
467
467
while (SharedUserData->SystemTime.High1Time != SharedUserData->SystemTime.High2Time)
+2
-2
dll/win32/browseui/parsecmdline.cpp
···
176
176
if (*strField != L':')
177
177
return NULL;
178
178
179
179
-
HANDLE hData = (HANDLE) StrToIntW(strField + 1);
179
179
+
HANDLE hData = IntToPtr(StrToIntW(strField + 1));
180
180
PWSTR strSecond = StrChrW(strField + 1, L':');
181
181
182
182
if (strSecond)
···
246
246
PathStripToRootW(strDir);
247
247
pInfo->pidlPath = ILCreateFromPathW(strDir);
248
248
}
249
249
-
return (LONG) (pInfo->pidlPath);
249
249
+
return (LONG_PTR)(pInfo->pidlPath);
250
250
}
251
251
252
252
PCWSTR strNextArg = _FindFirstField(strFieldArray);
+2
-2
dll/win32/fltlib/fltlib.c
···
74
74
{
75
75
PFILTER_NAME FilterName;
76
76
HANDLE hFltMgr;
77
77
-
DWORD StringLength;
78
78
-
DWORD BufferLength;
77
77
+
SIZE_T StringLength;
78
78
+
SIZE_T BufferLength;
79
79
DWORD dwError;
80
80
81
81
/* Get a handle to the filter manager */
+2
-2
dll/win32/fltlib/message.c
···
35
35
UNICODE_STRING DeviceName;
36
36
UNICODE_STRING PortName;
37
37
HANDLE FileHandle;
38
38
-
ULONG PortNameSize;
39
39
-
ULONG BufferSize;
38
38
+
SIZE_T PortNameSize;
39
39
+
SIZE_T BufferSize;
40
40
PCHAR Ptr;
41
41
NTSTATUS Status;
42
42
HRESULT hr;
+2
-2
dll/win32/iphlpapi/ifenum_reactos.c
···
62
62
NTSTATUS status = STATUS_SUCCESS;
63
63
DWORD returnSize;
64
64
65
65
-
WARN("TdiGetMibForIfEntity(tcpFile %x,entityId %x)\n",
66
66
-
(int)tcpFile, (int)ent->tei_instance);
65
65
+
WARN("TdiGetMibForIfEntity(tcpFile %p,entityId %p)\n",
66
66
+
tcpFile, ent->tei_instance);
67
67
68
68
req.ID.toi_class = INFO_CLASS_PROTOCOL;
69
69
req.ID.toi_type = INFO_TYPE_PROVIDER;
+5
-5
dll/win32/kernel32/client/file/create.c
···
447
447
default:
448
448
Sharing = FILE_SHARE_READ | FILE_SHARE_WRITE;
449
449
}
450
450
-
return (HFILE) CreateFileA (lpFileName,
450
450
+
return (HFILE)(ULONG_PTR) CreateFileA (lpFileName,
451
451
GENERIC_READ | GENERIC_WRITE,
452
452
Sharing,
453
453
NULL,
···
476
476
if (Len == 0 || Len > OFS_MAXPATHNAME)
477
477
{
478
478
lpReOpenBuff->nErrCode = (WORD)GetLastError();
479
479
-
return (HFILE)INVALID_HANDLE_VALUE;
479
479
+
return HFILE_ERROR;
480
480
}
481
481
482
482
if (uStyle & OF_DELETE)
···
507
507
NULL,
508
508
NULL))
509
509
{
510
510
-
return (HFILE)INVALID_HANDLE_VALUE;
510
510
+
return HFILE_ERROR;
511
511
}
512
512
513
513
// FILE_SHARE_READ
···
534
534
if (!NT_SUCCESS(errCode))
535
535
{
536
536
BaseSetLastNTError (errCode);
537
537
-
return (HFILE)INVALID_HANDLE_VALUE;
537
537
+
return HFILE_ERROR;
538
538
}
539
539
540
540
if (uStyle & OF_EXIST)
···
543
543
return (HFILE)1;
544
544
}
545
545
546
546
-
return (HFILE)FileHandle;
546
546
+
return (HFILE)(ULONG_PTR)FileHandle;
547
547
}
548
548
549
549
/*
+2
-2
dll/win32/kernel32/client/file/lfile.c
···
44
44
45
45
if (lBytes == 0)
46
46
{
47
47
-
if (!SetEndOfFile((HANDLE) hFile))
47
47
+
if (!SetEndOfFile((HANDLE)(ULONG_PTR) hFile))
48
48
{
49
49
return HFILE_ERROR;
50
50
}
···
98
98
default: dwSharing = FILE_SHARE_READ | FILE_SHARE_WRITE; break;
99
99
}
100
100
101
101
-
return (HFILE) CreateFileA(lpPathName,
101
101
+
return (HFILE)(ULONG_PTR) CreateFileA(lpPathName,
102
102
dwAccess,
103
103
dwSharing,
104
104
NULL,
+2
-1
dll/win32/kernel32/client/thread.c
···
176
176
ACTIVATION_CONTEXT_BASIC_INFORMATION ActCtxInfo;
177
177
ULONG_PTR Cookie;
178
178
ULONG ReturnLength;
179
179
+
SIZE_T ReturnSize;
179
180
DPRINT("CreateRemoteThread: hProcess: %p dwStackSize: %lu lpStartAddress"
180
181
": %p lpParameter: %p, dwCreationFlags: %lx\n", hProcess,
181
182
dwStackSize, lpStartAddress, lpParameter, dwCreationFlags);
···
267
268
ActivationContextBasicInformation,
268
269
&ActCtxInfo,
269
270
sizeof(ActCtxInfo),
270
270
-
&ReturnLength);
271
271
+
&ReturnSize);
271
272
if (!NT_SUCCESS(Status))
272
273
{
273
274
/* Fail */
+2
-2
dll/win32/lsasrv/authpackage.c
···
386
386
OUT PVOID *ClientBaseAddress)
387
387
{
388
388
PLSAP_LOGON_CONTEXT LogonContext;
389
389
-
ULONG Length;
389
389
+
SIZE_T Length;
390
390
391
391
*ClientBaseAddress = NULL;
392
392
···
409
409
IN PVOID ClientBaseAddress)
410
410
{
411
411
PLSAP_LOGON_CONTEXT LogonContext;
412
412
-
ULONG Length;
412
412
+
SIZE_T Length;
413
413
414
414
if (ClientBaseAddress == NULL)
415
415
return STATUS_SUCCESS;
+4
-2
dll/win32/lsasrv/session.c
···
258
258
PLIST_ENTRY SessionEntry;
259
259
PLSAP_LOGON_SESSION CurrentSession;
260
260
PLUID SessionList;
261
261
-
ULONG i, Length, MemSize;
261
261
+
ULONG i, Length;
262
262
+
SIZE_T MemSize;
262
263
PVOID ClientBaseAddress = NULL;
263
264
NTSTATUS Status;
264
265
···
353
354
PLSAP_LOGON_SESSION Session;
354
355
PSECURITY_LOGON_SESSION_DATA LocalSessionData;
355
356
PVOID ClientBaseAddress = NULL;
356
356
-
ULONG TotalLength, MemSize, SidLength = 0;
357
357
+
ULONG TotalLength, SidLength = 0;
358
358
+
SIZE_T MemSize;
357
359
PUCHAR Ptr;
358
360
NTSTATUS Status;
359
361
+26
-23
dll/win32/msafd/misc/dllmain.c
···
75
75
if (lpProtocolInfo && lpProtocolInfo->dwServiceFlags3 != 0 && lpProtocolInfo->dwServiceFlags4 != 0)
76
76
{
77
77
/* Duplpicating socket from different process */
78
78
-
if ((HANDLE)lpProtocolInfo->dwServiceFlags3 == INVALID_HANDLE_VALUE)
78
78
+
if (UlongToPtr(lpProtocolInfo->dwServiceFlags3) == INVALID_HANDLE_VALUE)
79
79
{
80
80
Status = WSAEINVAL;
81
81
goto error;
82
82
}
83
83
-
if ((HANDLE)lpProtocolInfo->dwServiceFlags4 == INVALID_HANDLE_VALUE)
83
83
+
if (UlongToPtr(lpProtocolInfo->dwServiceFlags4) == INVALID_HANDLE_VALUE)
84
84
{
85
85
Status = WSAEINVAL;
86
86
goto error;
87
87
}
88
88
-
SharedData = MapViewOfFile((HANDLE)lpProtocolInfo->dwServiceFlags3,
88
88
+
SharedData = MapViewOfFile(UlongToPtr(lpProtocolInfo->dwServiceFlags3),
89
89
FILE_MAP_ALL_ACCESS,
90
90
0,
91
91
0,
···
183
183
if (SharedData)
184
184
{
185
185
Socket->SharedData = SharedData;
186
186
-
Socket->SharedDataHandle = (HANDLE)lpProtocolInfo->dwServiceFlags3;
187
187
-
Sock = (HANDLE)lpProtocolInfo->dwServiceFlags4;
186
186
+
Socket->SharedDataHandle = UlongToHandle(lpProtocolInfo->dwServiceFlags3);
187
187
+
Sock = UlongToHandle(lpProtocolInfo->dwServiceFlags4);
188
188
Socket->Handle = (SOCKET)lpProtocolInfo->dwServiceFlags4;
189
189
}
190
190
else
···
422
422
if( SharedData )
423
423
{
424
424
UnmapViewOfFile(SharedData);
425
425
-
NtClose((HANDLE)lpProtocolInfo->dwServiceFlags3);
425
425
+
NtClose(UlongToHandle(lpProtocolInfo->dwServiceFlags3));
426
426
}
427
427
else
428
428
{
···
523
523
lpProtocolInfo->iAddressFamily = Socket->SharedData->AddressFamily;
524
524
lpProtocolInfo->iProtocol = Socket->SharedData->Protocol;
525
525
lpProtocolInfo->iSocketType = Socket->SharedData->SocketType;
526
526
-
lpProtocolInfo->dwServiceFlags3 = (DWORD)hDuplicatedSharedData;
527
527
-
lpProtocolInfo->dwServiceFlags4 = (DWORD)hDuplicatedHandle;
526
526
+
lpProtocolInfo->dwServiceFlags3 = HandleToUlong(hDuplicatedSharedData);
527
527
+
lpProtocolInfo->dwServiceFlags4 = HandleToUlong(hDuplicatedHandle);
528
528
529
529
if( lpErrno )
530
530
*lpErrno = NO_ERROR;
···
903
903
904
904
/* Set up Address in TDI Format */
905
905
BindData->Address.TAAddressCount = 1;
906
906
-
BindData->Address.Address[0].AddressLength = SocketAddressLength - sizeof(SocketAddress->sa_family);
906
906
+
BindData->Address.Address[0].AddressLength = (USHORT)(SocketAddressLength - sizeof(SocketAddress->sa_family));
907
907
BindData->Address.Address[0].AddressType = SocketAddress->sa_family;
908
908
RtlCopyMemory (BindData->Address.Address[0].Address,
909
909
SocketAddress->sa_data,
···
1427
1427
return (DWORD)((Time.ll - u1970.ll) / 10000000ULL);
1428
1428
}
1429
1429
1430
1430
+
_Must_inspect_result_
1430
1431
SOCKET
1431
1432
WSPAPI
1432
1432
-
WSPAccept(SOCKET Handle,
1433
1433
-
struct sockaddr *SocketAddress,
1434
1434
-
int *SocketAddressLength,
1435
1435
-
LPCONDITIONPROC lpfnCondition,
1436
1436
-
DWORD dwCallbackData,
1437
1437
-
LPINT lpErrno)
1433
1433
+
WSPAccept(
1434
1434
+
_In_ SOCKET Handle,
1435
1435
+
_Out_writes_bytes_to_opt_(*addrlen, *addrlen) struct sockaddr FAR *SocketAddress,
1436
1436
+
_Inout_opt_ LPINT SocketAddressLength,
1437
1437
+
_In_opt_ LPCONDITIONPROC lpfnCondition,
1438
1438
+
_In_opt_ DWORD_PTR dwCallbackData,
1439
1439
+
_Out_ LPINT lpErrno)
1438
1440
{
1439
1441
IO_STATUS_BLOCK IOSB;
1440
1442
PAFD_RECEIVED_ACCEPT_DATA ListenReceiveData;
···
2885
2887
* RETURNS:
2886
2888
* Status of operation
2887
2889
*/
2888
2888
-
INT
2890
2890
+
_Must_inspect_result_
2891
2891
+
int
2889
2892
WSPAPI
2890
2890
-
WSPStartup(IN WORD wVersionRequested,
2891
2891
-
OUT LPWSPDATA lpWSPData,
2892
2892
-
IN LPWSAPROTOCOL_INFOW lpProtocolInfo,
2893
2893
-
IN WSPUPCALLTABLE UpcallTable,
2894
2894
-
OUT LPWSPPROC_TABLE lpProcTable)
2895
2895
-
2893
2893
+
WSPStartup(
2894
2894
+
_In_ WORD wVersionRequested,
2895
2895
+
_In_ LPWSPDATA lpWSPData,
2896
2896
+
_In_ LPWSAPROTOCOL_INFOW lpProtocolInfo,
2897
2897
+
_In_ WSPUPCALLTABLE UpcallTable,
2898
2898
+
_Out_ LPWSPPROC_TABLE lpProcTable)
2896
2899
{
2897
2900
NTSTATUS Status;
2898
2901
···
2959
2962
IN OUT LPDWORD lpdwAddressStringLength,
2960
2963
OUT LPINT lpErrno)
2961
2964
{
2962
2962
-
DWORD size;
2965
2965
+
SIZE_T size;
2963
2966
WCHAR buffer[54]; /* 32 digits + 7':' + '[' + '%" + 5 digits + ']:' + 5 digits + '\0' */
2964
2967
WCHAR *p;
2965
2968
+7
-6
dll/win32/msafd/msafd.h
···
140
140
PSOCKET_INFORMATION lpSocket;
141
141
} AFDAPCCONTEXT, *PAFDAPCCONTEXT;
142
142
143
143
+
_Must_inspect_result_
143
144
SOCKET
144
145
WSPAPI
145
146
WSPAccept(
146
146
-
IN SOCKET s,
147
147
-
OUT LPSOCKADDR addr,
148
148
-
IN OUT LPINT addrlen,
149
149
-
IN LPCONDITIONPROC lpfnCondition,
150
150
-
IN DWORD dwCallbackData,
151
151
-
OUT LPINT lpErrno);
147
147
+
_In_ SOCKET s,
148
148
+
_Out_writes_bytes_to_opt_(*addrlen, *addrlen) struct sockaddr FAR * addr,
149
149
+
_Inout_opt_ LPINT addrlen,
150
150
+
_In_opt_ LPCONDITIONPROC lpfnCondition,
151
151
+
_In_opt_ DWORD_PTR dwCallbackData,
152
152
+
_Out_ LPINT lpErrno);
152
153
153
154
INT
154
155
WSPAPI
+1
-1
dll/win32/msgina/shutdown.c
···
398
398
}
399
399
}
400
400
401
401
-
static BOOL
401
401
+
static INT_PTR
402
402
CALLBACK
403
403
ShutdownDialogProc(
404
404
HWND hDlg,
+15
-15
dll/win32/mswsock/mswhelper.c
···
108
108
{
109
109
DWORD lstItemCount;
110
110
DWORD lstByteSize;
111
111
-
DWORD lstDataPos;
111
111
+
DWORD_PTR lstDataPos;
112
112
DWORD i1;
113
113
UINT_PTR *ptrSrcLstPos;
114
114
···
129
129
130
130
/* calculate position for the data of the first item */
131
131
lstDataPos = ((lstItemCount + 1) * sizeof(UINT_PTR)) +
132
132
-
(DWORD)mswBufferEndPtr(mswBuf);
132
132
+
(DWORD_PTR)mswBufferEndPtr(mswBuf);
133
133
/* add ptrofs */
134
134
lstDataPos += ptrofs;
135
135
···
164
164
DWORD lstItemLen[MAX_ARRAY_SIZE];
165
165
DWORD lstItemCount;
166
166
DWORD lstByteSize;
167
167
-
DWORD lstDataPos;
167
167
+
DWORD_PTR lstDataPos;
168
168
DWORD lstDataSize;
169
169
DWORD i1;
170
170
UINT_PTR *ptrSrcLstPos;
···
194
194
195
195
/* calculate position for the data of the first item */
196
196
lstDataPos = ((lstItemCount + 1) * sizeof(UINT_PTR)) +
197
197
-
(DWORD)mswBufferEndPtr(mswBuf);
197
197
+
(DWORD_PTR)mswBufferEndPtr(mswBuf);
198
198
199
199
/* add ptrofs */
200
200
lstDataPos += ptrofs;
···
261
261
{
262
262
if (!mswBufferAppendStrLstA(mswBuf,
263
263
(void**)hostAliasesA,
264
264
-
-(DWORD)bytesOfs))
264
264
+
-(LONG_PTR)bytesOfs))
265
265
return FALSE;
266
266
}
267
267
else
···
277
277
278
278
phe->h_addr_list = (char**)(mswBufferEndPtr(mswBuf) - bytesOfs);
279
279
280
280
-
if (!mswBufferAppendLst(mswBuf, lst, 4, -(DWORD)bytesOfs))
280
280
+
if (!mswBufferAppendLst(mswBuf, lst, 4, -(LONG_PTR)bytesOfs))
281
281
return FALSE;
282
282
283
283
/* name */
···
323
323
{
324
324
if (!mswBufferAppendStrLstA(mswBuf,
325
325
(void**)serviceAliasesA,
326
326
-
-(DWORD)bytesOfs))
326
326
+
-(LONG_PTR)bytesOfs))
327
327
return FALSE;
328
328
}
329
329
else
···
484
484
StrCpyHeapAllocW(_In_opt_ HANDLE hHeap,
485
485
_In_ WCHAR* wStr)
486
486
{
487
487
-
int chLen;
488
488
-
int bLen;
487
487
+
size_t chLen;
488
488
+
size_t bLen;
489
489
WCHAR* resW;
490
490
491
491
if (wStr == NULL)
···
507
507
StrCpyHeapAllocA(_In_opt_ HANDLE hHeap,
508
508
_In_ char* aStr)
509
509
{
510
510
-
int chLen;
511
511
-
int bLen;
510
510
+
size_t chLen;
511
511
+
size_t bLen;
512
512
char* resA;
513
513
514
514
if (aStr == NULL)
···
534
534
char** aDstPtr;
535
535
char* aDstNextStr;
536
536
DWORD aStrByteLen[MAX_ARRAY_SIZE];
537
537
-
int bLen;
538
538
-
int bItmLen;
537
537
+
size_t bLen;
538
538
+
size_t bItmLen;
539
539
int aCount;
540
540
int i1;
541
541
char** resA;
···
581
581
*aDstPtr = aDstNextStr;
582
582
RtlCopyMemory(*aDstPtr, *aSrcPtr, bItmLen);
583
583
584
584
-
aDstNextStr = (char*)((DWORD)aDstNextStr + (DWORD)bItmLen);
584
584
+
aDstNextStr = (char*)((DWORD_PTR)aDstNextStr + (DWORD)bItmLen);
585
585
aDstPtr++;
586
586
aSrcPtr++;
587
587
}
···
671
671
RtlCopyMemory(*aDstPtr, aStr, bItmLen);
672
672
HeapFree(hHeap, 0, aStr);
673
673
674
674
-
aDstNextStr = (char*)((DWORD)aDstNextStr + (DWORD)bItmLen);
674
674
+
aDstNextStr = (char*)((DWORD_PTR)aDstNextStr + (DWORD)bItmLen);
675
675
aDstPtr++;
676
676
wSrcPtr++;
677
677
}
+2
-2
dll/win32/psapi/psapi.c
···
506
506
*/
507
507
if (Count < cb / sizeof(DWORD))
508
508
{
509
509
-
lpidProcess[Count] = (DWORD)ProcInfo->UniqueProcessId;
509
509
+
lpidProcess[Count] = HandleToUlong(ProcInfo->UniqueProcessId);
510
510
Count++;
511
511
}
512
512
···
840
840
DWORD nSize)
841
841
{
842
842
DWORD Len;
843
843
-
DWORD OutSize;
843
843
+
SIZE_T OutSize;
844
844
NTSTATUS Status;
845
845
struct
846
846
{
+1
-1
dll/win32/shimgvw/shimgvw.c
···
188
188
GUID rawFormat;
189
189
UINT num;
190
190
UINT size;
191
191
-
UINT sizeRemain;
191
191
+
size_t sizeRemain;
192
192
UINT j;
193
193
WCHAR *c;
194
194
+2
-2
dll/win32/uxtheme/nonclient.c
···
68
68
SendMessageTimeout(pcontext->hWnd, WM_GETICON, ICON_BIG, 0, SMTO_ABORTIFHUNG, 1000, (PDWORD_PTR)&hIcon);
69
69
70
70
if (!hIcon)
71
71
-
hIcon = (HICON)GetClassLong(pcontext->hWnd, GCL_HICONSM);
71
71
+
hIcon = (HICON)GetClassLongPtr(pcontext->hWnd, GCLP_HICONSM);
72
72
73
73
if (!hIcon)
74
74
-
hIcon = (HICON)GetClassLong(pcontext->hWnd, GCL_HICON);
74
74
+
hIcon = (HICON)GetClassLongPtr(pcontext->hWnd, GCLP_HICON);
75
75
76
76
// See also win32ss/user/ntuser/nonclient.c!NC_IconForWindow
77
77
if (!hIcon && !(pcontext->wi.dwExStyle & WS_EX_DLGMODALFRAME))
+2
-2
dll/win32/wshtcpip/iflist.c
···
95
95
*idCount = (outBufLenNeeded / sizeof(TDIEntityID));
96
96
*ppEntities = (TDIEntityID*)outBuf;
97
97
98
98
-
DPRINT("TcpFile %lx\n", (DWORD)TcpFile);
98
98
+
DPRINT("TcpFile %p\n", TcpFile);
99
99
100
100
DPRINT("idCount %lx\n", *idCount);// 0x24;
101
101
···
247
247
goto cleanup;
248
248
}
249
249
250
250
-
DPRINT("TcpFile %lx\n",(DWORD)TcpFile);
250
250
+
DPRINT("TcpFile %p\n", TcpFile);
251
251
252
252
if (!AllocAndGetEntityArray(TcpFile,hHeap,&outEntityID,&outIDCount))
253
253
{
+1
-1
win32ss/gdi/gdi32/include/gdi32p.h
···
136
136
#define UMPDEV_SUPPORT_ESCAPE 0x0004
137
137
typedef struct _UMPDEV
138
138
{
139
139
-
DWORD_PTR Sig; // Init with PDEV_UMPD_ID
139
139
+
DWORD_PTR Sig; // Init with PDEV_UMPD_ID
140
140
struct _UMPDEV *pumpdNext;
141
141
PDRIVER_INFO_5W pdi5Info;
142
142
HMODULE hModule;