diff --git a/dlls/advapi32/tests/Makefile.in b/dlls/advapi32/tests/Makefile.in index 6a5a28d5df7..2e9b007a91f 100644 --- a/dlls/advapi32/tests/Makefile.in +++ b/dlls/advapi32/tests/Makefile.in @@ -1,4 +1,3 @@ -EXTRADEFS = -DWINE_NO_LONG_TYPES TESTDLL = advapi32.dll IMPORTS = ole32 advapi32 diff --git a/dlls/advapi32/tests/cred.c b/dlls/advapi32/tests/cred.c index 854f5a92b1f..24815967ac8 100644 --- a/dlls/advapi32/tests/cred.c +++ b/dlls/advapi32/tests/cred.c @@ -51,19 +51,19 @@ static void test_CredReadA(void) SetLastError(0xdeadbeef); ret = pCredReadA(TEST_TARGET_NAME, -1, 0, &cred); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef, &cred); ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER ), - "CredReadA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n", + "CredReadA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCredReadA(NULL, CRED_TYPE_GENERIC, 0, &cred); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); } @@ -75,7 +75,7 @@ static void test_CredWriteA(void) SetLastError(0xdeadbeef); ret = pCredWriteA(NULL, 0); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); new_cred.Flags = 0; @@ -93,7 +93,7 @@ static void test_CredWriteA(void) SetLastError(0xdeadbeef); ret = pCredWriteA(&new_cred, 0); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); new_cred.TargetName = (char *)TEST_TARGET_NAME; @@ -105,63 +105,63 @@ static void test_CredWriteA(void) { ok(GetLastError() == ERROR_SUCCESS || GetLastError() == ERROR_IO_PENDING, /* Vista */ - "Expected ERROR_IO_PENDING, got %d\n", GetLastError()); + "Expected ERROR_IO_PENDING, got %ld\n", GetLastError()); } else { ok(GetLastError() == ERROR_BAD_USERNAME || GetLastError() == ERROR_NO_SUCH_LOGON_SESSION, /* Vista */ "CredWrite with username without domain should return ERROR_BAD_USERNAME" - "or ERROR_NO_SUCH_LOGON_SESSION not %d\n", GetLastError()); + "or ERROR_NO_SUCH_LOGON_SESSION not %ld\n", GetLastError()); } new_cred.UserName = NULL; SetLastError(0xdeadbeef); ret = pCredWriteA(&new_cred, 0); ok(!ret && GetLastError() == ERROR_BAD_USERNAME, - "CredWriteA with NULL username should have failed with ERROR_BAD_USERNAME instead of %d\n", + "CredWriteA with NULL username should have failed with ERROR_BAD_USERNAME instead of %ld\n", GetLastError()); new_cred.UserName = (char *)"winetest"; new_cred.Persist = CRED_PERSIST_LOCAL_MACHINE; SetLastError(0xdeadbeef); ret = pCredWriteA(&new_cred, 0); - ok(ret || broken(!ret), "CredWriteA failed with error %u\n", GetLastError()); + ok(ret || broken(!ret), "CredWriteA failed with error %lu\n", GetLastError()); if (ret) { ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_DOMAIN_PASSWORD, 0); - ok(ret, "CredDeleteA failed with error %u\n", GetLastError()); + ok(ret, "CredDeleteA failed with error %lu\n", GetLastError()); } new_cred.Type = CRED_TYPE_GENERIC; SetLastError(0xdeadbeef); ret = pCredWriteA(&new_cred, 0); - ok(ret || broken(!ret), "CredWriteA failed with error %u\n", GetLastError()); + ok(ret || broken(!ret), "CredWriteA failed with error %lu\n", GetLastError()); if (ret) { ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0); - ok(ret, "CredDeleteA failed with error %u\n", GetLastError()); + ok(ret, "CredDeleteA failed with error %lu\n", GetLastError()); } new_cred.Persist = CRED_PERSIST_SESSION; ret = pCredWriteA(&new_cred, 0); - ok(ret, "CredWriteA failed with error %u\n", GetLastError()); + ok(ret, "CredWriteA failed with error %lu\n", GetLastError()); ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0); - ok(ret, "CredDeleteA failed with error %u\n", GetLastError()); + ok(ret, "CredDeleteA failed with error %lu\n", GetLastError()); new_cred.Type = CRED_TYPE_DOMAIN_PASSWORD; SetLastError(0xdeadbeef); ret = pCredWriteA(&new_cred, 0); - ok(ret || broken(!ret), "CredWriteA failed with error %u\n", GetLastError()); + ok(ret || broken(!ret), "CredWriteA failed with error %lu\n", GetLastError()); if (ret) { ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_DOMAIN_PASSWORD, 0); - ok(ret, "CredDeleteA failed with error %u\n", GetLastError()); + ok(ret, "CredDeleteA failed with error %lu\n", GetLastError()); } new_cred.UserName = NULL; SetLastError(0xdeadbeef); ret = pCredWriteA(&new_cred, 0); ok(!ret, "CredWriteA succeeded\n"); - ok(GetLastError() == ERROR_BAD_USERNAME, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_BAD_USERNAME, "got %lu\n", GetLastError()); } static void test_CredDeleteA(void) @@ -171,13 +171,13 @@ static void test_CredDeleteA(void) SetLastError(0xdeadbeef); ret = pCredDeleteA(TEST_TARGET_NAME, -1, 0); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "CredDeleteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "CredDeleteA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef); ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER /* Vista */ ), - "CredDeleteA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n", + "CredDeleteA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); } @@ -208,7 +208,7 @@ if(0) SetLastError(0xdeadbeef); ret = pCredReadDomainCredentialsA(NULL, 0, &count, &creds); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "CredReadDomainCredentialsA should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "CredReadDomainCredentialsA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); @@ -216,7 +216,7 @@ if(0) count = 2; ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds); ok(!ret && GetLastError() == ERROR_NOT_FOUND, - "CredReadDomainCredentialsA should have failed with ERROR_NOT_FOUND instead of %d\n", + "CredReadDomainCredentialsA should have failed with ERROR_NOT_FOUND instead of %ld\n", GetLastError()); ok(count ==0 && creds == NULL, "CredReadDomainCredentialsA must not return any result\n"); @@ -227,7 +227,7 @@ if(0) ok(!ret, "CredReadDomainCredentialsA should have failed\n"); ok(GetLastError() == ERROR_NOT_FOUND || GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */ - "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n", + "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); info.DnsServerName = NULL; @@ -237,7 +237,7 @@ if(0) ok(!ret, "CredReadDomainCredentialsA should have failed\n"); ok(GetLastError() == ERROR_NOT_FOUND || GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */ - "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n", + "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); } @@ -246,14 +246,14 @@ static void check_blob(int line, DWORD cred_type, PCREDENTIALA cred) if (cred_type == CRED_TYPE_DOMAIN_PASSWORD) { todo_wine - ok_(__FILE__, line)(cred->CredentialBlobSize == 0, "expected CredentialBlobSize of 0 but got %d\n", cred->CredentialBlobSize); + ok_(__FILE__, line)(cred->CredentialBlobSize == 0, "expected CredentialBlobSize of 0 but got %ld\n", cred->CredentialBlobSize); todo_wine ok_(__FILE__, line)(!cred->CredentialBlob, "expected NULL credentials but got %p\n", cred->CredentialBlob); } else { DWORD size=sizeof(TEST_PASSWORD); - ok_(__FILE__, line)(cred->CredentialBlobSize == size, "expected CredentialBlobSize of %u but got %u\n", size, cred->CredentialBlobSize); + ok_(__FILE__, line)(cred->CredentialBlobSize == size, "expected CredentialBlobSize of %lu but got %lu\n", size, cred->CredentialBlobSize); ok_(__FILE__, line)(cred->CredentialBlob != NULL, "CredentialBlob should be present\n"); if (cred->CredentialBlob) ok_(__FILE__, line)(!memcmp(cred->CredentialBlob, TEST_PASSWORD, size), "wrong CredentialBlob\n"); @@ -283,7 +283,7 @@ static void test_generic(void) ret = pCredWriteA(&new_cred, 0); ok(ret || broken(GetLastError() == ERROR_NO_SUCH_LOGON_SESSION), - "CredWriteA failed with error %d\n", GetLastError()); + "CredWriteA failed with error %ld\n", GetLastError()); if (!ret) { skip("couldn't write generic credentials, skipping tests\n"); @@ -291,7 +291,7 @@ static void test_generic(void) } ret = pCredEnumerateA(NULL, 0, &count, &creds); - ok(ret, "CredEnumerateA failed with error %d\n", GetLastError()); + ok(ret, "CredEnumerateA failed with error %ld\n", GetLastError()); for (i = 0; i < count; i++) { @@ -299,12 +299,12 @@ static void test_generic(void) { ok(creds[i]->Type == CRED_TYPE_GENERIC || creds[i]->Type == CRED_TYPE_DOMAIN_PASSWORD, /* Vista */ - "expected creds[%d]->Type CRED_TYPE_GENERIC or CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type); - ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags); - ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment); + "expected creds[%ld]->Type CRED_TYPE_GENERIC or CRED_TYPE_DOMAIN_PASSWORD but got %ld\n", i, creds[i]->Type); + ok(!creds[i]->Flags, "expected creds[%ld]->Flags 0 but got 0x%lx\n", i, creds[i]->Flags); + ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%ld]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment); check_blob(__LINE__, creds[i]->Type, creds[i]); - ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist); - ok(!strcmp(creds[i]->UserName, "winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName); + ok(creds[i]->Persist, "expected creds[%ld]->Persist CRED_PERSIST_ENTERPRISE but got %ld\n", i, creds[i]->Persist); + ok(!strcmp(creds[i]->UserName, "winetest"), "expected creds[%ld]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName); found = TRUE; } } @@ -312,11 +312,11 @@ static void test_generic(void) ok(found, "credentials not found\n"); ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0, &cred); - ok(ret, "CredReadA failed with error %d\n", GetLastError()); + ok(ret, "CredReadA failed with error %ld\n", GetLastError()); pCredFree(cred); ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0); - ok(ret, "CredDeleteA failed with error %d\n", GetLastError()); + ok(ret, "CredDeleteA failed with error %ld\n", GetLastError()); } static void test_domain_password(DWORD cred_type) @@ -346,21 +346,21 @@ static void test_domain_password(DWORD cred_type) "or are disabled. Skipping\n"); return; } - ok(ret, "CredWriteA failed with error %d\n", GetLastError()); + ok(ret, "CredWriteA failed with error %ld\n", GetLastError()); ret = pCredEnumerateA(NULL, 0, &count, &creds); - ok(ret, "CredEnumerateA failed with error %d\n", GetLastError()); + ok(ret, "CredEnumerateA failed with error %ld\n", GetLastError()); for (i = 0; i < count; i++) { if (creds[i]->TargetName && !strcmp(creds[i]->TargetName, TEST_TARGET_NAME)) { - ok(creds[i]->Type == cred_type, "expected creds[%d]->Type CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type); - ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags); - ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment); + ok(creds[i]->Type == cred_type, "expected creds[%ld]->Type CRED_TYPE_DOMAIN_PASSWORD but got %ld\n", i, creds[i]->Type); + ok(!creds[i]->Flags, "expected creds[%ld]->Flags 0 but got 0x%lx\n", i, creds[i]->Flags); + ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%ld]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment); check_blob(__LINE__, cred_type, creds[i]); - ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist); - ok(!strcmp(creds[i]->UserName, "test\\winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName); + ok(creds[i]->Persist, "expected creds[%ld]->Persist CRED_PERSIST_ENTERPRISE but got %ld\n", i, creds[i]->Persist); + ok(!strcmp(creds[i]->UserName, "test\\winetest"), "expected creds[%ld]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName); found = TRUE; } } @@ -368,7 +368,7 @@ static void test_domain_password(DWORD cred_type) ok(found, "credentials not found\n"); ret = pCredReadA(TEST_TARGET_NAME, cred_type, 0, &cred); - ok(ret, "CredReadA failed with error %d\n", GetLastError()); + ok(ret, "CredReadA failed with error %ld\n", GetLastError()); if (ret) /* don't check the values of cred, if CredReadA failed. */ { check_blob(__LINE__, cred_type, cred); @@ -376,7 +376,7 @@ static void test_domain_password(DWORD cred_type) } ret = pCredDeleteA(TEST_TARGET_NAME, cred_type, 0); - ok(ret, "CredDeleteA failed with error %d\n", GetLastError()); + ok(ret, "CredDeleteA failed with error %ld\n", GetLastError()); } static void test_CredMarshalCredentialA(void) @@ -397,7 +397,7 @@ static void test_CredMarshalCredentialA(void) ret = pCredMarshalCredentialA( 0, NULL, NULL ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); memset( cert.rgbHashOfCert, 0, sizeof(cert.rgbHashOfCert) ); cert.cbSize = sizeof(cert); @@ -405,28 +405,28 @@ static void test_CredMarshalCredentialA(void) ret = pCredMarshalCredentialA( 0, &cert, NULL ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); str = (char *)0xdeadbeef; SetLastError( 0xdeadbeef ); ret = pCredMarshalCredentialA( 0, &cert, &str ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); ok( str == (char *)0xdeadbeef, "got %p\n", str ); SetLastError( 0xdeadbeef ); ret = pCredMarshalCredentialA( CertCredential, NULL, NULL ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); if (0) { /* crash */ SetLastError( 0xdeadbeef ); ret = pCredMarshalCredentialA( CertCredential, &cert, NULL ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); } cert.cbSize = 0; @@ -435,13 +435,13 @@ static void test_CredMarshalCredentialA(void) ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); ok( str == (char *)0xdeadbeef, "got %p\n", str ); cert.cbSize = sizeof(cert) + 4; str = NULL; ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str ); pCredFree( str ); @@ -450,7 +450,7 @@ static void test_CredMarshalCredentialA(void) cert.rgbHashOfCert[0] = 2; str = NULL; ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@BCAAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str ); pCredFree( str ); @@ -458,7 +458,7 @@ static void test_CredMarshalCredentialA(void) cert.rgbHashOfCert[0] = 255; str = NULL; ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@B-DAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str ); pCredFree( str ); @@ -467,7 +467,7 @@ static void test_CredMarshalCredentialA(void) cert.rgbHashOfCert[1] = 1; str = NULL; ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@BBEAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str ); pCredFree( str ); @@ -477,7 +477,7 @@ static void test_CredMarshalCredentialA(void) cert.rgbHashOfCert[2] = 1; str = NULL; ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@BBEQAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str ); pCredFree( str ); @@ -489,7 +489,7 @@ static void test_CredMarshalCredentialA(void) cert.rgbHashOfCert[3] = 'e'; str = NULL; ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@BXlmblBAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str ); pCredFree( str ); @@ -497,7 +497,7 @@ static void test_CredMarshalCredentialA(void) memset( cert.rgbHashOfCert, 0xff, sizeof(cert.rgbHashOfCert) ); str = NULL; ret = pCredMarshalCredentialA( CertCredential, &cert, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@B--------------------------P" ), "got %s\n", str ); pCredFree( str ); @@ -508,7 +508,7 @@ static void test_CredMarshalCredentialA(void) ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); ok( str == (char *)0xdeadbeef, "got %p\n", str ); username.UserName = emptyW; @@ -517,13 +517,13 @@ static void test_CredMarshalCredentialA(void) ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); ok( str == (char *)0xdeadbeef, "got %p\n", str ); username.UserName = tW; str = NULL; ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@CCAAAAA0BA" ), "got %s\n", str ); pCredFree( str ); @@ -531,7 +531,7 @@ static void test_CredMarshalCredentialA(void) username.UserName = teW; str = NULL; ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@CEAAAAA0BQZAA" ), "got %s\n", str ); pCredFree( str ); @@ -539,7 +539,7 @@ static void test_CredMarshalCredentialA(void) username.UserName = tesW; str = NULL; ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@CGAAAAA0BQZAMHA" ), "got %s\n", str ); pCredFree( str ); @@ -547,7 +547,7 @@ static void test_CredMarshalCredentialA(void) username.UserName = testW; str = NULL; ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@CIAAAAA0BQZAMHA0BA" ), "got %s\n", str ); pCredFree( str ); @@ -555,7 +555,7 @@ static void test_CredMarshalCredentialA(void) username.UserName = test1W; str = NULL; ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str ); - ok( ret, "unexpected failure %u\n", GetLastError() ); + ok( ret, "unexpected failure %lu\n", GetLastError() ); ok( str != NULL, "str not set\n" ); ok( !lstrcmpA( str, "@@CKAAAAA0BQZAMHA0BQMAA" ), "got %s\n", str ); pCredFree( str ); @@ -627,14 +627,14 @@ static void test_CredUnmarshalCredentialA(void) ret = pCredUnmarshalCredentialA( NULL, NULL, NULL ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); cert = NULL; SetLastError( 0xdeadbeef ); ret = pCredUnmarshalCredentialA( NULL, NULL, (void **)&cert ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); type = 0; cert = NULL; @@ -642,20 +642,20 @@ static void test_CredUnmarshalCredentialA(void) ret = pCredUnmarshalCredentialA( NULL, &type, (void **)&cert ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); if (0) { /* crash */ SetLastError( 0xdeadbeef ); ret = pCredUnmarshalCredentialA( "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA", &type, NULL ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); SetLastError( 0xdeadbeef ); ret = pCredUnmarshalCredentialA( "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA", NULL, (void **)&cert ); error = GetLastError(); ok( !ret, "unexpected success\n" ); - ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error ); + ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error ); } for (i = 0; i < ARRAY_SIZE(tests); i++) @@ -667,7 +667,7 @@ static void test_CredUnmarshalCredentialA(void) error = GetLastError(); if (tests[i].unmarshaled) { - ok(ret, "[%u] unexpected failure %u\n", i, error); + ok(ret, "[%u] unexpected failure %lu\n", i, error); ok(type == tests[i].type, "[%u] got %u\n", i, type); ok(p != NULL, "[%u] returned pointer is NULL\n", i); if (tests[i].type == CertCredential) @@ -675,7 +675,7 @@ static void test_CredUnmarshalCredentialA(void) cert = p; hash = tests[i].unmarshaled; ok(cert->cbSize == sizeof(*cert), - "[%u] wrong size %u\n", i, cert->cbSize); + "[%u] wrong size %lu\n", i, cert->cbSize); for (j = 0; j < sizeof(cert->rgbHashOfCert); j++) ok(cert->rgbHashOfCert[j] == hash[j], "[%u] wrong data\n", i); } @@ -690,7 +690,7 @@ static void test_CredUnmarshalCredentialA(void) else { ok(!ret, "[%u] unexpected success\n", i); - ok(error == ERROR_INVALID_PARAMETER, "[%u] got %u\n", i, error); + ok(error == ERROR_INVALID_PARAMETER, "[%u] got %lu\n", i, error); ok(type == tests[i].type, "[%u] got %u\n", i, type); ok(p == NULL, "[%u] returned pointer is not NULL\n", i); } @@ -752,11 +752,11 @@ static void test_CredIsMarshaledCredentialA(void) SetLastError(0xdeadbeef); res = pCredIsMarshaledCredentialA(ptr[i]); if (expected) - ok(res != FALSE, "%d: got %d and %u for %s (expected TRUE)\n", i, res, GetLastError(), ptr[i]); + ok(res != FALSE, "%d: got %d and %lu for %s (expected TRUE)\n", i, res, GetLastError(), ptr[i]); else { /* Windows returns ERROR_INVALID_PARAMETER here, but that's not documented */ - ok(!res, "%d: got %d and %u for %s (expected FALSE)\n", i, res, GetLastError(), ptr[i]); + ok(!res, "%d: got %d and %lu for %s (expected FALSE)\n", i, res, GetLastError(), ptr[i]); } } } @@ -789,10 +789,10 @@ START_TEST(cred) BOOL ret; DWORD i; ret = pCredGetSessionTypes(CRED_TYPE_MAXIMUM, persists); - ok(ret, "CredGetSessionTypes failed with error %d\n", GetLastError()); - ok(persists[0] == CRED_PERSIST_NONE, "persists[0] = %u instead of CRED_PERSIST_NONE\n", persists[0]); + ok(ret, "CredGetSessionTypes failed with error %ld\n", GetLastError()); + ok(persists[0] == CRED_PERSIST_NONE, "persists[0] = %lu instead of CRED_PERSIST_NONE\n", persists[0]); for (i=0; i < CRED_TYPE_MAXIMUM; i++) - ok(persists[i] <= CRED_PERSIST_ENTERPRISE, "bad value for persists[%u]: %u\n", i, persists[i]); + ok(persists[i] <= CRED_PERSIST_ENTERPRISE, "bad value for persists[%lu]: %lu\n", i, persists[i]); } else memset(persists, CRED_PERSIST_ENTERPRISE, sizeof(persists)); diff --git a/dlls/advapi32/tests/crypt.c b/dlls/advapi32/tests/crypt.c index 6df47cd626b..f08c4e2a626 100644 --- a/dlls/advapi32/tests/crypt.c +++ b/dlls/advapi32/tests/crypt.c @@ -72,7 +72,7 @@ static void init_environment(void) CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_NEWKEYSET); } ret = CryptReleaseContext(hProv, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); /* Ensure that container "wine_test_keyset" does exist in default PROV_RSA_FULL type provider */ if (!CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0)) @@ -80,13 +80,13 @@ static void init_environment(void) CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET); } ret = CryptReleaseContext(hProv, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); /* Ensure that container "wine_test_bad_keyset" does not exist. */ if (CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0)) { ret = CryptReleaseContext(hProv, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET); } @@ -101,7 +101,7 @@ static void clean_up_environment(void) if (CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0)) { ret = CryptReleaseContext(hProv, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET); } @@ -110,7 +110,7 @@ static void clean_up_environment(void) if (CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0)) { ret = CryptReleaseContext(hProv, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET); } @@ -119,7 +119,7 @@ static void clean_up_environment(void) if (CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0)) { ret = CryptReleaseContext(hProv, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET); } @@ -137,47 +137,47 @@ static void test_CryptReleaseContext(void) SetLastError(0xdeadbeef); ret = CryptReleaseContext(0, 0); ok(!ret, "CryptReleaseContext succeeded unexpectedly\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = CryptReleaseContext(0, ~0); ok(!ret, "CryptReleaseContext succeeded unexpectedly\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError()); /* Additional refcount */ ret = CryptAcquireContextA(&prov, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); ret = CryptContextAddRef(prov, NULL, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); ret = CryptContextAddRef(0, NULL, 0); - ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError()); + ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError()); ret = CryptContextAddRef(0xdeadbeef, NULL, 0); - ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError()); + ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError()); ret = CryptReleaseContext(prov, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); /* Nonzero flags, which allow release nonetheless */ SetLastError(0xdeadbeef); ret = CryptReleaseContext(prov, ~0); ok(!ret, "CryptReleaseContext succeeded unexpectedly\n"); - ok(GetLastError() == NTE_BAD_FLAGS, "got %u\n", GetLastError()); + ok(GetLastError() == NTE_BAD_FLAGS, "got %lu\n", GetLastError()); /* Obsolete provider */ SetLastError(0xdeadbeef); ret = CryptReleaseContext(prov, 0); ok(!ret, "CryptReleaseContext succeeded unexpectedly\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = CryptReleaseContext(prov, ~0); ok(!ret, "CryptReleaseContext succeeded unexpectedly\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError()); } static void test_acquire_context(void) @@ -191,19 +191,19 @@ static void test_acquire_context(void) * but since this is likely to change between CSP versions, we don't check * this. Please don't change the order of tests. */ result = CryptAcquireContextA(&hProv, NULL, NULL, 0, 0); - ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%d\n", GetLastError()); + ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError()); result = CryptAcquireContextA(&hProv, NULL, NULL, 1000, 0); - ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%d\n", GetLastError()); + ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError()); result = CryptAcquireContextA(&hProv, NULL, NULL, NON_DEF_PROV_TYPE, 0); - ok(!result && GetLastError()==NTE_PROV_TYPE_NOT_DEF, "%d\n", GetLastError()); + ok(!result && GetLastError()==NTE_PROV_TYPE_NOT_DEF, "%ld\n", GetLastError()); result = CryptAcquireContextA(&hProv, szKeySet, szNonExistentProv, PROV_RSA_FULL, 0); - ok(!result && GetLastError()==NTE_KEYSET_NOT_DEF, "%d\n", GetLastError()); + ok(!result && GetLastError()==NTE_KEYSET_NOT_DEF, "%ld\n", GetLastError()); result = CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, NON_DEF_PROV_TYPE, 0); - ok(!result && GetLastError()==NTE_PROV_TYPE_NO_MATCH, "%d\n", GetLastError()); + ok(!result && GetLastError()==NTE_PROV_TYPE_NO_MATCH, "%ld\n", GetLastError()); if (0) @@ -212,7 +212,7 @@ if (0) result = TRUE, GetLastError() == ERROR_INVALID_PARAMETER */ SetLastError(0xdeadbeef); result = CryptAcquireContextA(NULL, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0); - ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d/%d\n", result, GetLastError()); + ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d/%ld\n", result, GetLastError()); } /* Last not least, try to really acquire a context. */ @@ -224,12 +224,12 @@ if (0) GLE == ERROR_SUCCESS || GLE == ERROR_RING2_STACK_IN_USE || GLE == NTE_FAIL || - GLE == ERROR_NOT_LOGGED_ON), "%d/%d\n", result, GLE); + GLE == ERROR_NOT_LOGGED_ON), "%d/%ld\n", result, GLE); if (hProv) { result = CryptReleaseContext(hProv, 0); - ok(result, "got %u\n", GetLastError()); + ok(result, "got %lu\n", GetLastError()); } /* Try again, witch an empty ("\0") szProvider parameter */ @@ -241,12 +241,12 @@ if (0) GLE == ERROR_SUCCESS || GLE == ERROR_RING2_STACK_IN_USE || GLE == NTE_FAIL || - GLE == ERROR_NOT_LOGGED_ON), "%d/%d\n", result, GetLastError()); + GLE == ERROR_NOT_LOGGED_ON), "%d/%ld\n", result, GetLastError()); if (hProv) { result = CryptReleaseContext(hProv, 0); - ok(result, "got %u\n", GetLastError()); + ok(result, "got %lu\n", GetLastError()); } } @@ -271,203 +271,203 @@ static void test_incorrect_api_usage(void) result = CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_NEWKEYSET); - ok (result, "%08x\n", GetLastError()); + ok (result, "%08lx\n", GetLastError()); if (!result) return; /* Looks like native handles are just pointers. */ ok(!!*(void **)hProv, "Got zero *(void **)hProv.\n"); result = CryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash); - ok (result, "%d\n", GetLastError()); + ok (result, "%ld\n", GetLastError()); if (!result) return; result = CryptDeriveKey(0, CALG_RC4, hHash, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDeriveKey(hProv, CALG_RC4, 0, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptHashData(0, &temp, 1, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptGenKey(hProv, CALG_RC4, 0, &hKey); - ok (result, "%d\n", GetLastError()); + ok (result, "%ld\n", GetLastError()); if (!result) return; result = pCryptHashSessionKey(hHash, 0, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = pCryptHashSessionKey(0, hKey, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDestroyHash(hHash); - ok (result, "%08x\n", GetLastError()); + ok (result, "%08lx\n", GetLastError()); result = CryptDestroyHash(0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptCreateHash(0xdeadbeef, CALG_SHA, 0, 0, &hHash); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptCreateHash(0, CALG_SHA, 0, 0, &hHash); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptGenKey(0, CALG_RC4, 0, &hKey); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptDecrypt(hKey, 0, TRUE, 0, &temp, &dwLen); - ok (result, "%d\n", GetLastError()); + ok (result, "%ld\n", GetLastError()); result = CryptDecrypt(hKey, 0xdeadbeef, TRUE, 0, &temp, &dwLen); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDecrypt(0, 0, TRUE, 0, &temp, &dwLen); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDecrypt(0xdeadbeef, 0, TRUE, 0, &temp, &dwLen); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptEncrypt(hKey, 0, TRUE, 0, &temp, &dwLen, sizeof(temp)); - ok (result, "%d\n", GetLastError()); + ok (result, "%ld\n", GetLastError()); result = CryptEncrypt(hKey, 0xdeadbeef, TRUE, 0, &temp, &dwLen, sizeof(temp)); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptEncrypt(0, 0, TRUE, 0, &temp, &dwLen, sizeof(temp)); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptEncrypt(0xdeadbeef, 0, TRUE, 0, &temp, &dwLen, sizeof(temp)); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptExportKey(hKey, 0xdeadbeef, 0, 0, &temp, &dwLen); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDestroyKey(hKey); - ok (result, "%d\n", GetLastError()); + ok (result, "%ld\n", GetLastError()); result = CryptGenKey(hProv, CALG_RC4, 0, &hKey2); - ok (result, "%d\n", GetLastError()); + ok (result, "%ld\n", GetLastError()); if (!result) return; result = CryptDestroyKey(hKey2); - ok (result, "%d\n", GetLastError()); + ok (result, "%ld\n", GetLastError()); result = CryptDestroyKey(0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwTemp = CRYPT_MODE_ECB; result = CryptSetKeyParam(hKey2, KP_MODE, (BYTE*)&dwTemp, sizeof(DWORD)); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); hProv2 = 0xdeadbeef; result = CryptAcquireContextA(&hProv2, szBadKeySet, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET); - ok (result, "%d\n", GetLastError()); - ok (hProv2 == 0, "%ld\n", hProv2); + ok (result, "%ld\n", GetLastError()); + ok (hProv2 == 0, "%Id\n", hProv2); if (!result) return; result = CryptReleaseContext(hProv, 0); - ok(result, "got %u\n", GetLastError()); + ok(result, "got %lu\n", GetLastError()); if (!result) return; result = pCryptGenRandom(0, 1, &temp); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = pCryptGenRandom(hProv, 1, &temp); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptContextAddRef(hProv, NULL, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptDecrypt(hKey, 0, TRUE, 0, &temp, &dwLen); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptEncrypt(hKey, 0, TRUE, 0, &temp, &dwLen, 1); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDeriveKey(hProv, CALG_RC4, hHash, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = pCryptDuplicateHash(hHash, NULL, 0, &hHash2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDuplicateKey(hKey, NULL, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptExportKey(hKey, 0, 0, 0, &temp, &dwLen); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptGenKey(hProv, CALG_RC4, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptGetHashParam(hHash, 0, &temp, &dwLen, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptGetKeyParam(hKey, 0, &temp, &dwLen, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); dwLen = 1; result = CryptGetProvParam(hProv, 0, &temp, &dwLen, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptGetUserKey(0, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptGetUserKey(hProv, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptHashData(hHash, &temp, 1, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = pCryptHashSessionKey(hHash, hKey, 0); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptImportKey(hProv, &temp, 1, 0, 0, &hKey2); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); if (pCryptSignHashW) { dwLen = 1; result = pCryptSignHashW(hHash, 0, NULL, 0, &temp, &dwLen); ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER || - GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError()); + GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError()); result = pCryptSignHashW(hHash, 0, NULL, 0, &temp, &dwLen); ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER || - GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError()); + GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError()); } else win_skip("CryptSignHashW is not available\n"); result = CryptSetKeyParam(hKey, 0, &temp, 1); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptSetHashParam(hHash, 0, &temp, 1); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptSetProvParam(0, 0, &temp, 1); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptSetProvParam(hProv, 0, &temp, 1); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); if (pCryptVerifySignatureW) { result = pCryptVerifySignatureW(hHash, &temp, 1, hKey, NULL, 0); ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER || - GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError()); + GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError()); } else win_skip("CryptVerifySignatureW is not available\n"); result = CryptDestroyHash(hHash); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); result = CryptDestroyKey(hKey); - ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); } static const BYTE privKey[] = { @@ -518,51 +518,51 @@ static void test_verify_sig(void) return; } ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %08x\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError()); ret = CryptAcquireContextA(&prov, szKeySet, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET); if (!ret && GetLastError() == NTE_EXISTS) ret = CryptAcquireContextA(&prov, szKeySet, NULL, PROV_RSA_FULL, 0); - ok(ret, "CryptAcquireContextA failed: %08x\n", GetLastError()); + ok(ret, "CryptAcquireContextA failed: %08lx\n", GetLastError()); ret = CryptImportKey(prov, (LPBYTE)privKey, sizeof(privKey), 0, 0, &key); - ok(ret, "CryptImportKey failed: %08x\n", GetLastError()); + ok(ret, "CryptImportKey failed: %08lx\n", GetLastError()); ret = CryptCreateHash(prov, CALG_MD5, 0, 0, &hash); - ok(ret, "CryptCreateHash failed: %08x\n", GetLastError()); + ok(ret, "CryptCreateHash failed: %08lx\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCryptVerifySignatureW(hash, NULL, 0, 0, NULL, 0); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %08x\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCryptVerifySignatureW(0, NULL, 0, key, NULL, 0); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %08x\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCryptVerifySignatureW(hash, NULL, 0, key, NULL, 0); ok(!ret && (GetLastError() == NTE_BAD_SIGNATURE || GetLastError() == ERROR_INVALID_PARAMETER), - "Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08x\n", + "Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCryptVerifySignatureW(hash, NULL, sizeof(bogus), key, NULL, 0); ok(!ret && (GetLastError() == NTE_BAD_SIGNATURE || GetLastError() == ERROR_INVALID_PARAMETER), - "Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08x\n", + "Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCryptVerifySignatureW(hash, bogus, 0, key, NULL, 0); ok(!ret && GetLastError() == NTE_BAD_SIGNATURE, - "Expected NTE_BAD_SIGNATURE, got %08x\n", GetLastError()); + "Expected NTE_BAD_SIGNATURE, got %08lx\n", GetLastError()); SetLastError(0xdeadbeef); ret = pCryptVerifySignatureW(hash, bogus, sizeof(bogus), key, NULL, 0); ok(!ret && (GetLastError() == NTE_BAD_SIGNATURE || broken(GetLastError() == NTE_BAD_HASH_STATE /* older NT4 */)), - "Expected NTE_BAD_SIGNATURE, got %08x\n", GetLastError()); + "Expected NTE_BAD_SIGNATURE, got %08lx\n", GetLastError()); CryptDestroyKey(key); CryptDestroyHash(hash); ret = CryptReleaseContext(prov, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); } static BOOL FindProvRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszProvName, @@ -626,11 +626,11 @@ static void test_enum_providers(void) /* check pdwReserved flag for NULL */ result = pCryptEnumProvidersA(dwIndex, ¬Null, 0, &type, NULL, &providerLen); - ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); + ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%ld\n", GetLastError()); /* check dwFlags == 0 */ result = pCryptEnumProvidersA(dwIndex, NULL, notZeroFlags, &type, NULL, &providerLen); - ok(!result && GetLastError()==NTE_BAD_FLAGS, "%d\n", GetLastError()); + ok(!result && GetLastError()==NTE_BAD_FLAGS, "%ld\n", GetLastError()); /* alloc provider to half the size required * cbName holds the size required */ @@ -639,7 +639,7 @@ static void test_enum_providers(void) return; result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen); - ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %d\n", + ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n", ERROR_MORE_DATA, GetLastError()); LocalFree(provider); @@ -657,7 +657,7 @@ static void test_enum_providers(void) * ERROR_NO_MORE_ITEMS */ for (count = 0; count < provCount + 1; count++) result = pCryptEnumProvidersA(count, NULL, 0, &type, NULL, &providerLen); - ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %d\n", + ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n", ERROR_NO_MORE_ITEMS, GetLastError()); /* check expected versus actual values returned */ @@ -668,20 +668,20 @@ static void test_enum_providers(void) providerLen = -1; result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen); - ok(result, "expected TRUE, got %d\n", result); - ok(type==dwType, "expected %d, got %d\n", dwType, type); + ok(result, "expected TRUE, got %ld\n", result); + ok(type==dwType, "expected %ld, got %ld\n", dwType, type); if (pszProvName) ok(!strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider); - ok(cbName==providerLen, "expected %d, got %d\n", cbName, providerLen); + ok(cbName==providerLen, "expected %ld, got %ld\n", cbName, providerLen); providerLen = -1000; provider[0] = 0; result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen); - ok(result, "expected TRUE, got %d\n", result); - ok(type==dwType, "expected %d, got %d\n", dwType, type); + ok(result, "expected TRUE, got %ld\n", result); + ok(type==dwType, "expected %ld, got %ld\n", dwType, type); if (pszProvName) ok(!strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider); - ok(cbName==providerLen, "expected %d, got %d\n", cbName, providerLen); + ok(cbName==providerLen, "expected %ld, got %ld\n", cbName, providerLen); LocalFree(pszProvName); LocalFree(provider); @@ -779,12 +779,12 @@ static void test_enum_provider_types(void) /* check pdwReserved for NULL */ result = pCryptEnumProviderTypesA(index, ¬Null, 0, &provType, typeName, &typeNameSize); - ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", + ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* check dwFlags == zero */ result = pCryptEnumProviderTypesA(index, NULL, notZeroFlags, &provType, typeName, &typeNameSize); - ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected ERROR_INVALID_PARAMETER, got %d\n", + ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* This test fails under Win2k SP4: @@ -799,7 +799,7 @@ static void test_enum_provider_types(void) SetLastError(0xdeadbeef); result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize); - ok(!result && GetLastError()==ERROR_MORE_DATA, "expected 0/ERROR_MORE_DATA, got %d/%d\n", + ok(!result && GetLastError()==ERROR_MORE_DATA, "expected 0/ERROR_MORE_DATA, got %ld/%ld\n", result, GetLastError()); LocalFree(typeName); @@ -812,28 +812,28 @@ static void test_enum_provider_types(void) while(pCryptEnumProviderTypesA(typeCount++, NULL, 0, &provType, NULL, &typeNameSize)) ; typeCount--; - ok(typeCount==dwTypeCount, "expected %d, got %d\n", dwTypeCount, typeCount); + ok(typeCount==dwTypeCount, "expected %ld, got %ld\n", dwTypeCount, typeCount); /* loop past the actual number of provider types to get the error * ERROR_NO_MORE_ITEMS */ for (typeCount = 0; typeCount < dwTypeCount + 1; typeCount++) result = pCryptEnumProviderTypesA(typeCount, NULL, 0, &provType, NULL, &typeNameSize); - ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n", + ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n", GetLastError()); /* check expected versus actual values returned */ result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, NULL, &typeNameSize); - ok(result && typeNameSize==cbTypeName, "expected %d, got %d\n", cbTypeName, typeNameSize); + ok(result && typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize); if (!(typeName = LocalAlloc(LMEM_ZEROINIT, typeNameSize))) goto cleanup; typeNameSize = 0xdeadbeef; result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize); - ok(result, "expected TRUE, got %d\n", result); - ok(provType==dwProvType, "expected %d, got %d\n", dwProvType, provType); + ok(result, "expected TRUE, got %ld\n", result); + ok(provType==dwProvType, "expected %ld, got %ld\n", dwProvType, provType); if (pszTypeName) ok(!strcmp(pszTypeName, typeName), "expected %s, got %s\n", pszTypeName, typeName); - ok(typeNameSize==cbTypeName, "expected %d, got %d\n", cbTypeName, typeNameSize); + ok(typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize); LocalFree(typeName); cleanup: @@ -920,13 +920,13 @@ static void test_get_default_provider(void) /* check pdwReserved for NULL */ result = pCryptGetDefaultProviderA(provType, ¬Null, flags, provName, &provNameSize); - ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %d\n", + ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n", ERROR_INVALID_PARAMETER, GetLastError()); /* check for invalid flag */ flags = 0xdeadbeef; result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize); - ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %d, got %d\n", + ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %ld, got %ld\n", NTE_BAD_FLAGS, GetLastError()); flags = CRYPT_MACHINE_DEFAULT; @@ -935,7 +935,7 @@ static void test_get_default_provider(void) result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize); ok(!result && (GetLastError() == NTE_BAD_PROV_TYPE || GetLastError() == ERROR_INVALID_PARAMETER), - "expected NTE_BAD_PROV_TYPE or ERROR_INVALID_PARAMETER, got %d/%d\n", + "expected NTE_BAD_PROV_TYPE or ERROR_INVALID_PARAMETER, got %ld/%ld\n", result, GetLastError()); provType = PROV_RSA_FULL; @@ -948,14 +948,14 @@ static void test_get_default_provider(void) return; result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize); - ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %d\n", + ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n", ERROR_MORE_DATA, GetLastError()); LocalFree(provName); /* check expected versus actual values returned */ result = pCryptGetDefaultProviderA(provType, NULL, flags, NULL, &provNameSize); - ok(result && provNameSize==cbProvName, "expected %d, got %d\n", cbProvName, provNameSize); + ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize); provNameSize = cbProvName; if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize))) @@ -963,10 +963,10 @@ static void test_get_default_provider(void) provNameSize = 0xdeadbeef; result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize); - ok(result, "expected TRUE, got %d\n", result); + ok(result, "expected TRUE, got %ld\n", result); if(pszProvName) ok(!strcmp(pszProvName, provName), "expected %s, got %s\n", pszProvName, provName); - ok(provNameSize==cbProvName, "expected %d, got %d\n", cbProvName, provNameSize); + ok(provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize); LocalFree(pszProvName); LocalFree(provName); @@ -994,11 +994,11 @@ static void test_set_provider_ex(void) if (!(curProvName = LocalAlloc(LMEM_ZEROINIT, curlen))) return; result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, curProvName, &curlen); - ok(result, "%d\n", GetLastError()); + ok(result, "%ld\n", GetLastError()); /* check pdwReserved for NULL */ result = pCryptSetProviderExA(MS_DEF_PROV_A, PROV_RSA_FULL, ¬Null, CRYPT_MACHINE_DEFAULT); - ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %d\n", + ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n", ERROR_INVALID_PARAMETER, GetLastError()); /* remove the default provider and then set it to MS_DEF_PROV/PROV_RSA_FULL */ @@ -1007,31 +1007,31 @@ static void test_set_provider_ex(void) if (!result) { ok( GetLastError() == ERROR_ACCESS_DENIED || broken(GetLastError() == ERROR_INVALID_PARAMETER), - "wrong error %u\n", GetLastError() ); + "wrong error %lu\n", GetLastError() ); skip("Not enough rights to remove the default provider\n"); LocalFree(curProvName); return; } result = pCryptSetProviderExA(MS_DEF_PROV_A, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT); - ok(result, "%d\n", GetLastError()); + ok(result, "%ld\n", GetLastError()); /* call CryptGetDefaultProvider to see if they match */ result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, NULL, &cbProvName); - ok(result, "%d\n", GetLastError()); + ok(result, "%ld\n", GetLastError()); if (!(pszProvName = LocalAlloc(LMEM_ZEROINIT, cbProvName))) goto reset; result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, pszProvName, &cbProvName); ok(result && !strcmp(MS_DEF_PROV_A, pszProvName), "expected %s, got %s\n", MS_DEF_PROV_A, pszProvName); - ok(result && cbProvName==(strlen(MS_DEF_PROV_A) + 1), "expected %i, got %d\n", (lstrlenA(MS_DEF_PROV_A) + 1), cbProvName); + ok(result && cbProvName==(strlen(MS_DEF_PROV_A) + 1), "expected %i, got %ld\n", (lstrlenA(MS_DEF_PROV_A) + 1), cbProvName); LocalFree(pszProvName); reset: /* Set the provider back to its original */ result = pCryptSetProviderExA(curProvName, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT); - ok(result, "%d\n", GetLastError()); + ok(result, "%ld\n", GetLastError()); LocalFree(curProvName); } @@ -1059,7 +1059,7 @@ static void test_machine_guid(void) { restoreGuid = TRUE; r = RegDeleteValueA(key, "MachineGuid"); - ok(!r || broken(r == ERROR_ACCESS_DENIED) /*win8*/, "RegDeleteValueA failed: %d\n", r); + ok(!r || broken(r == ERROR_ACCESS_DENIED) /*win8*/, "RegDeleteValueA failed: %ld\n", r); if (r == ERROR_ACCESS_DENIED) { skip("broken virtualization on HKLM\\Software\\Microsoft\\Cryptography\n"); @@ -1068,14 +1068,14 @@ static void test_machine_guid(void) } } else - ok(r == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n", + ok(r == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n", r); /* Create and release a provider */ ret = CryptAcquireContextA(&hCryptProv, szKeySet, NULL, PROV_RSA_FULL, 0); ok(ret || broken(!ret && GetLastError() == NTE_KEYSET_ENTRY_BAD /* NT4 */), - "CryptAcquireContextA failed: %08x\n", GetLastError()); + "CryptAcquireContextA failed: %08lx\n", GetLastError()); ret = CryptReleaseContext(hCryptProv, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); if (restoreGuid) RegSetValueExA(key, "MachineGuid", 0, REG_SZ, (const BYTE *)originalGuid, @@ -1105,7 +1105,7 @@ static void test_rc2_keylen(void) SetLastError(0xdeadbeef); ret = CryptAcquireContextA(&provider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT); - ok(ret, "CryptAcquireContext error %u\n", GetLastError()); + ok(ret, "CryptAcquireContext error %lu\n", GetLastError()); if (ret) { key_blob.header.bType = PLAINTEXTKEYBLOB; @@ -1122,18 +1122,18 @@ static void test_rc2_keylen(void) /* CRYPT_IPSEC_HMAC_KEY is not supported on W2K and lower */ ok(ret || broken(!ret && GetLastError() == NTE_BAD_FLAGS), - "CryptImportKey error %08x\n", GetLastError()); + "CryptImportKey error %08lx\n", GetLastError()); if (ret) CryptDestroyKey(hkey); ret = CryptReleaseContext(provider, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); } SetLastError(0xdeadbeef); ret = CryptAcquireContextA(&provider, NULL, MS_DEF_PROV_A, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT); - ok(ret, "CryptAcquireContext error %08x\n", GetLastError()); + ok(ret, "CryptAcquireContext error %08lx\n", GetLastError()); if (ret) { @@ -1145,7 +1145,7 @@ static void test_rc2_keylen(void) GetLastError() == NTE_BAD_LEN || /* Win7 */ GetLastError() == NTE_BAD_TYPE || /* W2K */ GetLastError() == NTE_PERM), /* Win9x, WinMe and NT4 */ - "unexpected error %08x\n", GetLastError()); + "unexpected error %08lx\n", GetLastError()); /* but importing an 56-bit (7-byte) key does.. */ key_blob.key_size = 7; SetLastError(0xdeadbeef); @@ -1154,7 +1154,7 @@ static void test_rc2_keylen(void) ok(ret || broken(!ret && GetLastError() == NTE_BAD_TYPE) || /* W2K */ broken(!ret && GetLastError() == NTE_PERM), /* Win9x, WinMe and NT4 */ - "CryptAcquireContext error %08x\n", GetLastError()); + "CryptAcquireContext error %08lx\n", GetLastError()); if (ret) CryptDestroyKey(hkey); /* as does importing a 16-byte key with the base provider when @@ -1167,18 +1167,18 @@ static void test_rc2_keylen(void) /* CRYPT_IPSEC_HMAC_KEY is not supported on W2K and lower */ ok(ret || broken(!ret && GetLastError() == NTE_BAD_FLAGS), - "CryptImportKey error %08x\n", GetLastError()); + "CryptImportKey error %08lx\n", GetLastError()); if (ret) CryptDestroyKey(hkey); ret = CryptReleaseContext(provider, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); } key_blob.key_size = sizeof(key); SetLastError(0xdeadbeef); ret = CryptAcquireContextA(&provider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT); - ok(ret, "CryptAcquireContext error %08x\n", GetLastError()); + ok(ret, "CryptAcquireContext error %08lx\n", GetLastError()); if (ret) { @@ -1190,7 +1190,7 @@ static void test_rc2_keylen(void) 0, CRYPT_IPSEC_HMAC_KEY, &hkey); ok(ret || broken(!ret && GetLastError() == NTE_BAD_FLAGS), - "CryptImportKey error %08x\n", GetLastError()); + "CryptImportKey error %08lx\n", GetLastError()); if (ret) CryptDestroyKey(hkey); @@ -1203,12 +1203,12 @@ static void test_rc2_keylen(void) 0, CRYPT_IPSEC_HMAC_KEY, &hkey); ok(ret || broken(!ret && GetLastError() == NTE_BAD_FLAGS), - "CryptImportKey error %08x\n", GetLastError()); + "CryptImportKey error %08lx\n", GetLastError()); if (ret) CryptDestroyKey(hkey); ret = CryptReleaseContext(provider, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); } } @@ -1231,7 +1231,7 @@ static void test_SystemFunction036(void) { SetLastError(0xdeadbeef); ret = pSystemFunction036(NULL, 5); - trace("ret = %d, GetLastError() = %d\n", ret, GetLastError()); + trace("ret = %d, GetLastError() = %ld\n", ret, GetLastError()); } ret = pSystemFunction036(&test, 0); @@ -1250,29 +1250,29 @@ static void test_container_sd(void) ret = CryptAcquireContextA(&prov, "winetest", "Microsoft Enhanced Cryptographic Provider v1.0", PROV_RSA_FULL, CRYPT_MACHINE_KEYSET|CRYPT_NEWKEYSET); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); len = 0; SetLastError(0xdeadbeef); ret = CryptGetProvParam(prov, PP_KEYSET_SEC_DESCR, NULL, &len, OWNER_SECURITY_INFORMATION); err = GetLastError(); - ok(ret, "got %u\n", err); - ok(err == ERROR_INSUFFICIENT_BUFFER || broken(err == ERROR_INVALID_PARAMETER), "got %u\n", err); + ok(ret, "got %lu\n", err); + ok(err == ERROR_INSUFFICIENT_BUFFER || broken(err == ERROR_INVALID_PARAMETER), "got %lu\n", err); ok(len, "expected len > 0\n"); sd = HeapAlloc(GetProcessHeap(), 0, len); ret = CryptGetProvParam(prov, PP_KEYSET_SEC_DESCR, (BYTE *)sd, &len, OWNER_SECURITY_INFORMATION); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); HeapFree(GetProcessHeap(), 0, sd); ret = CryptReleaseContext(prov, 0); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); prov = 0xdeadbeef; ret = CryptAcquireContextA(&prov, "winetest", "Microsoft Enhanced Cryptographic Provider v1.0", PROV_RSA_FULL, CRYPT_MACHINE_KEYSET|CRYPT_DELETEKEYSET); - ok(ret, "got %u\n", GetLastError()); - ok(prov == 0, "got %ld\n", prov); + ok(ret, "got %lu\n", GetLastError()); + ok(prov == 0, "got %Id\n", prov); } START_TEST(crypt) diff --git a/dlls/advapi32/tests/eventlog.c b/dlls/advapi32/tests/eventlog.c index 7e66e9ad8d7..793addf3d29 100644 --- a/dlls/advapi32/tests/eventlog.c +++ b/dlls/advapi32/tests/eventlog.c @@ -70,7 +70,7 @@ static BOOL create_backup(const char *filename) win_skip( "Can't open event log\n" ); return FALSE; } - ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError()); + ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError()); DeleteFileA(filename); rc = BackupEventLogA(handle, filename); @@ -80,12 +80,12 @@ static BOOL create_backup(const char *filename) CloseEventLog(handle); return FALSE; } - ok(rc, "BackupEventLogA failed, le=%u\n", GetLastError()); + ok(rc, "BackupEventLogA failed, le=%lu\n", GetLastError()); CloseEventLog(handle); attribs = GetFileAttributesA(filename); todo_wine - ok(attribs != INVALID_FILE_ATTRIBUTES, "Expected a backup file attribs=%#x le=%u\n", attribs, GetLastError()); + ok(attribs != INVALID_FILE_ATTRIBUTES, "Expected a backup file attribs=%#lx le=%lu\n", attribs, GetLastError()); return TRUE; } @@ -99,46 +99,46 @@ static void test_open_close(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE || GetLastError() == ERROR_NOACCESS, /* W2K */ - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); handle = OpenEventLogA(NULL, NULL); ok(handle == NULL, "Didn't expect a handle\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); handle = OpenEventLogA("IDontExist", NULL); ok(handle == NULL, "Didn't expect a handle\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); handle = OpenEventLogA("IDontExist", "deadbeef"); ok(handle == NULL, "Didn't expect a handle\n"); ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */ - "Expected RPC_S_SERVER_UNAVAILABLE, got %d\n", GetLastError()); + "Expected RPC_S_SERVER_UNAVAILABLE, got %ld\n", GetLastError()); /* This one opens the Application log */ handle = OpenEventLogA(NULL, "deadbeef"); - ok(handle != NULL, "Expected a handle : %d\n", GetLastError()); + ok(handle != NULL, "Expected a handle : %ld\n", GetLastError()); ret = CloseEventLog(handle); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); /* Close a second time */ SetLastError(0xdeadbeef); ret = CloseEventLog(handle); todo_wine { ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); } /* Empty servername should be read as local server */ handle = OpenEventLogA("", "Application"); - ok(handle != NULL, "Expected a handle : %d\n", GetLastError()); + ok(handle != NULL, "Expected a handle : %ld\n", GetLastError()); CloseEventLog(handle); handle = OpenEventLogA(NULL, "Application"); - ok(handle != NULL, "Expected a handle : %d\n", GetLastError()); + ok(handle != NULL, "Expected a handle : %ld\n", GetLastError()); CloseEventLog(handle); } @@ -159,47 +159,47 @@ static void test_info(void) SetLastError(0xdeadbeef); ret = pGetEventLogInformation(NULL, 1, NULL, 0, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_LEVEL, "Expected ERROR_INVALID_LEVEL, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_LEVEL, "Expected ERROR_INVALID_LEVEL, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pGetEventLogInformation(NULL, EVENTLOG_FULL_INFO, NULL, 0, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); handle = OpenEventLogA(NULL, "Application"); - ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError()); + ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, NULL, 0, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %d\n", GetLastError()); + ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, NULL, 0, &needed); ok(!ret, "Expected failure\n"); - ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %d\n", GetLastError()); + ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, 0, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %d\n", GetLastError()); + ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); needed = 0xdeadbeef; efi->dwFull = 0xdeadbeef; ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, 0, &needed); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %d\n", needed); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %ld\n", needed); ok(efi->dwFull == 0xdeadbeef, "Expected no change to the dwFull member\n"); /* Not that we care, but on success last error is set to ERROR_IO_PENDING */ efi->dwFull = 0xdeadbeef; needed = sizeof(buffer); ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, needed, &needed); - ok(ret, "Expected success : %d\n", GetLastError()); - ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %d\n", needed); - ok(efi->dwFull == 0 || efi->dwFull == 1, "Expected 0 (not full) or 1 (full), got %d\n", efi->dwFull); + ok(ret, "Expected success : %ld\n", GetLastError()); + ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %ld\n", needed); + ok(efi->dwFull == 0 || efi->dwFull == 1, "Expected 0 (not full) or 1 (full), got %ld\n", efi->dwFull); CloseEventLog(handle); } @@ -214,26 +214,26 @@ static void test_count(void) SetLastError(0xdeadbeef); ret = GetNumberOfEventLogRecords(NULL, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); count = 0xdeadbeef; ret = GetNumberOfEventLogRecords(NULL, &count); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); ok(count == 0xdeadbeef, "Expected count to stay unchanged\n"); handle = OpenEventLogA(NULL, "Application"); - ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError()); + ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = GetNumberOfEventLogRecords(handle, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); count = 0xdeadbeef; ret = GetNumberOfEventLogRecords(handle, &count); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); ok(count != 0xdeadbeef, "Expected the number of records\n"); CloseEventLog(handle); @@ -243,14 +243,14 @@ static void test_count(void) { handle = OpenBackupEventLogA(NULL, backup); todo_wine - ok(handle != NULL, "Expected a handle, le=%d\n", GetLastError()); + ok(handle != NULL, "Expected a handle, le=%ld\n", GetLastError()); /* Does GetNumberOfEventLogRecords work with backup eventlogs? */ count = 0xdeadbeef; ret = GetNumberOfEventLogRecords(handle, &count); todo_wine { - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); ok(count != 0xdeadbeef, "Expected the number of records\n"); } @@ -269,13 +269,13 @@ static void test_oldest(void) SetLastError(0xdeadbeef); ret = GetOldestEventLogRecord(NULL, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); oldest = 0xdeadbeef; ret = GetOldestEventLogRecord(NULL, &oldest); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); ok(oldest == 0xdeadbeef, "Expected oldest to stay unchanged\n"); handle = OpenEventLogA(NULL, "Application"); @@ -284,16 +284,16 @@ static void test_oldest(void) win_skip( "Can't open event log\n" ); return; } - ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError()); + ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = GetOldestEventLogRecord(handle, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); oldest = 0xdeadbeef; ret = GetOldestEventLogRecord(handle, &oldest); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); ok(oldest != 0xdeadbeef, "Expected the number of the oldest record\n"); CloseEventLog(handle); @@ -310,7 +310,7 @@ static void test_oldest(void) ret = GetOldestEventLogRecord(handle, &oldest); todo_wine { - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); ok(oldest != 0xdeadbeef, "Expected the number of the oldest record\n"); } @@ -329,7 +329,7 @@ static void test_backup(void) SetLastError(0xdeadbeef); ret = BackupEventLogA(NULL, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = BackupEventLogA(NULL, backup); @@ -342,12 +342,12 @@ static void test_backup(void) win_skip( "Can't open event log\n" ); return; } - ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError()); + ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = BackupEventLogA(handle, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); ret = BackupEventLogA(handle, backup); if (!ret && GetLastError() == ERROR_PRIVILEGE_NOT_HELD) @@ -356,7 +356,7 @@ static void test_backup(void) CloseEventLog(handle); return; } - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); todo_wine ok(GetFileAttributesA(backup) != INVALID_FILE_ATTRIBUTES, "Expected a backup file\n"); @@ -366,7 +366,7 @@ static void test_backup(void) todo_wine { ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_ALREADY_EXISTS, "Expected ERROR_ALREADY_EXISTS, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_ALREADY_EXISTS, "Expected ERROR_ALREADY_EXISTS, got %ld\n", GetLastError()); } CloseEventLog(handle); @@ -379,7 +379,7 @@ static void test_backup(void) ret = BackupEventLogA(handle, backup2); todo_wine { - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); ok(GetFileAttributesA(backup2) != INVALID_FILE_ATTRIBUTES, "Expected a backup file\n"); } @@ -399,7 +399,7 @@ static void test_read(void) ret = ReadEventLogA(NULL, 0, 0, NULL, 0, NULL, NULL); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); read = 0xdeadbeef; SetLastError(0xdeadbeef); @@ -407,7 +407,7 @@ static void test_read(void) ok(!ret, "Expected failure\n"); ok(read == 0xdeadbeef, "Expected 'read' parameter to remain unchanged\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); needed = 0xdeadbeef; SetLastError(0xdeadbeef); @@ -415,26 +415,26 @@ static void test_read(void) ok(!ret, "Expected failure\n"); ok(needed == 0xdeadbeef, "Expected 'needed' parameter to remain unchanged\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* 'read' and 'needed' are only filled when the needed buffer size is passed back or when the call succeeds */ SetLastError(0xdeadbeef); ret = ReadEventLogA(NULL, 0, 0, NULL, 0, &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ReadEventLogA(NULL, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, NULL, 0, NULL, NULL); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ReadEventLogA(NULL, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, NULL, 0, &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); buf = NULL; SetLastError(0xdeadbeef); @@ -442,7 +442,7 @@ static void test_read(void) 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD)); SetLastError(0xdeadbeef); @@ -450,7 +450,7 @@ static void test_read(void) 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); HeapFree(GetProcessHeap(), 0, buf); handle = OpenEventLogA(NULL, "Application"); @@ -459,7 +459,7 @@ static void test_read(void) win_skip( "Can't open event log\n" ); return; } - ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError()); + ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError()); /* Show that we need the proper dwFlags with a (for the rest) proper call */ buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD)); @@ -468,40 +468,40 @@ static void test_read(void) ret = ReadEventLogA(handle, 0, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ | EVENTLOG_BACKWARDS_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ | EVENTLOG_FORWARDS_READ | EVENTLOG_BACKWARDS_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ | EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed); ok(!ret, "Expected failure\n"); todo_wine - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); HeapFree(GetProcessHeap(), 0, buf); @@ -524,7 +524,7 @@ static void test_read(void) ok(!ret, "Expected failure\n"); ok(read == 0, "Expected no bytes read\n"); ok(needed > sizeof(EVENTLOGRECORD), "Expected the needed buffersize to be bigger than sizeof(EVENTLOGRECORD)\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* Read the first record */ toread = needed; @@ -532,7 +532,7 @@ static void test_read(void) read = needed = 0xdeadbeef; SetLastError(0xdeadbeef); ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, buf, toread, &read, &needed); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); ok(read == toread || broken(read < toread), /* NT4 wants a buffer size way bigger than just 1 record */ "Expected the requested size to be read\n"); @@ -552,7 +552,7 @@ static void test_openbackup(void) SetLastError(0xdeadbeef); handle = OpenBackupEventLogA(NULL, NULL); ok(handle == NULL, "Didn't expect a handle\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); handle = OpenBackupEventLogA(NULL, "idontexist.evt"); @@ -560,19 +560,19 @@ static void test_openbackup(void) ok(GetLastError() == ERROR_FILE_NOT_FOUND || GetLastError() == ERROR_ACCESS_DENIED || GetLastError() == RPC_S_SERVER_UNAVAILABLE, - "got %d\n", GetLastError()); + "got %ld\n", GetLastError()); SetLastError(0xdeadbeef); handle = OpenBackupEventLogA("IDontExist", NULL); ok(handle == NULL, "Didn't expect a handle\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); handle = OpenBackupEventLogA("IDontExist", "idontexist.evt"); ok(handle == NULL, "Didn't expect a handle\n"); ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */ - "Expected RPC_S_SERVER_UNAVAILABLE, got %d\n", GetLastError()); + "Expected RPC_S_SERVER_UNAVAILABLE, got %ld\n", GetLastError()); /* Make a backup eventlog to work with */ if (create_backup(backup)) @@ -589,7 +589,7 @@ static void test_openbackup(void) ok(handle == NULL, "Didn't expect a handle\n"); ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */ - "Expected RPC_S_SERVER_UNAVAILABLE, got %d\n", GetLastError()); + "Expected RPC_S_SERVER_UNAVAILABLE, got %ld\n", GetLastError()); /* Empty servername should be read as local server */ handle = OpenBackupEventLogA("", backup); @@ -619,7 +619,7 @@ static void test_openbackup(void) GetLastError() == ERROR_ACCESS_DENIED || GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == ERROR_EVENTLOG_FILE_CORRUPT, /* Vista and Win7 */ - "got %d\n", GetLastError()); + "got %ld\n", GetLastError()); CloseEventLog(handle); DeleteFileA(backup); @@ -632,7 +632,7 @@ static void test_openbackup(void) ok(GetLastError() == ERROR_EVENTLOG_FILE_CORRUPT || GetLastError() == ERROR_ACCESS_DENIED || GetLastError() == RPC_S_SERVER_UNAVAILABLE, - "got %d\n", GetLastError()); + "got %ld\n", GetLastError()); CloseEventLog(handle); DeleteFileA(backup); } @@ -647,7 +647,7 @@ static void test_clear(void) SetLastError(0xdeadbeef); ret = ClearEventLogA(NULL, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); /* Make a backup eventlog to work with */ if (!create_backup(backup)) @@ -656,7 +656,7 @@ static void test_clear(void) SetLastError(0xdeadbeef); ret = ClearEventLogA(NULL, backup); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); handle = OpenBackupEventLogA(NULL, backup); todo_wine @@ -671,19 +671,19 @@ static void test_clear(void) */ ok(GetLastError() == ERROR_INVALID_HANDLE || GetLastError() == ERROR_ACCESS_DENIED, /* Vista+ */ - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); /* Show that ClearEventLog only works for real eventlogs. */ SetLastError(0xdeadbeef); ret = ClearEventLogA(handle, backup2); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); ok(GetFileAttributesA(backup2) == INVALID_FILE_ATTRIBUTES, "Expected no backup file\n"); SetLastError(0xdeadbeef); ret = ClearEventLogA(handle, NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); CloseEventLog(handle); todo_wine @@ -832,7 +832,7 @@ static void test_readwrite(void) { win_skip("Win7 fails when using incorrect event types\n"); ret = ReportEventA(handle, 0, 0, 0, NULL, 0, 0, NULL, NULL); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); } else { @@ -840,7 +840,7 @@ static void test_readwrite(void) DWORD read, needed = 0; EVENTLOGRECORD *record; - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); /* Needed to catch earlier Vista (with no ServicePack for example) */ buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD)); @@ -891,22 +891,22 @@ static void test_readwrite(void) ret = ReportEventA(handle, read_write[i].evt_type, read_write[i].evt_cat, read_write[i].evt_id, run_sidtests ? user : NULL, read_write[i].evt_numstrings, 0, read_write[i].evt_strings, NULL); - ok(ret, "Expected ReportEvent success : %d\n", GetLastError()); + ok(ret, "Expected ReportEvent success : %ld\n", GetLastError()); count = 0xdeadbeef; SetLastError(0xdeadbeef); ret = GetNumberOfEventLogRecords(handle, &count); - ok(ret, "Expected GetNumberOfEventLogRecords success : %d\n", GetLastError()); + ok(ret, "Expected GetNumberOfEventLogRecords success : %ld\n", GetLastError()); todo_wine - ok(count == (i + 1), "Expected %d records, got %d\n", i + 1, count); + ok(count == (i + 1), "Expected %ld records, got %ld\n", i + 1, count); oldest = 0xdeadbeef; ret = GetOldestEventLogRecord(handle, &oldest); - ok(ret, "Expected GetOldestEventLogRecord success : %d\n", GetLastError()); + ok(ret, "Expected GetOldestEventLogRecord success : %ld\n", GetLastError()); todo_wine ok(oldest == 1 || (oldest > 1 && oldest != 0xdeadbeef), /* Vista SP1+, W2K8 and Win7 */ - "Expected oldest to be 1 or higher, got %d\n", oldest); + "Expected oldest to be 1 or higher, got %ld\n", oldest); if (oldest > 1 && oldest != 0xdeadbeef) on_vista = TRUE; @@ -915,15 +915,15 @@ static void test_readwrite(void) ret = CloseEventLog(handle); else ret = DeregisterEventSource(handle); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); } handle = OpenEventLogA(NULL, eventlogname); count = 0xdeadbeef; ret = GetNumberOfEventLogRecords(handle, &count); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); todo_wine - ok(count == i, "Expected %d records, got %d\n", i, count); + ok(count == i, "Expected %ld records, got %ld\n", i, count); CloseEventLog(handle); if (count == 0) @@ -954,7 +954,7 @@ static void test_readwrite(void) /* Read all events from our created eventlog, one by one */ handle = OpenEventLogA(NULL, eventlogname); - ok(handle != NULL, "Failed to open Event Log, got %d\n", GetLastError()); + ok(handle != NULL, "Failed to open Event Log, got %ld\n", GetLastError()); i = 0; for (;;) { @@ -974,26 +974,26 @@ static void test_readwrite(void) if (!ret && GetLastError() != ERROR_INSUFFICIENT_BUFFER) { HeapFree(GetProcessHeap(), 0, buf); - ok(GetLastError() == ERROR_HANDLE_EOF, "record %d, got %d\n", i, GetLastError()); + ok(GetLastError() == ERROR_HANDLE_EOF, "record %ld, got %ld\n", i, GetLastError()); break; } buf = HeapReAlloc(GetProcessHeap(), 0, buf, needed); ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, buf, needed, &read, &needed); - ok(ret, "Expected success: %d\n", GetLastError()); + ok(ret, "Expected success: %ld\n", GetLastError()); record = (EVENTLOGRECORD *)buf; ok(record->Length == read, - "Expected %d, got %d\n", read, record->Length); + "Expected %ld, got %ld\n", read, record->Length); ok(record->Reserved == 0x654c664c, - "Expected 0x654c664c, got %d\n", record->Reserved); + "Expected 0x654c664c, got %ld\n", record->Reserved); ok(record->RecordNumber == i + 1 || (on_vista && (record->RecordNumber > i + 1)), - "Expected %d or higher, got %d\n", i + 1, record->RecordNumber); + "Expected %ld or higher, got %ld\n", i + 1, record->RecordNumber); ok(record->EventID == read_write[i].evt_id, - "Expected %d, got %d\n", read_write[i].evt_id, record->EventID); + "Expected %ld, got %ld\n", read_write[i].evt_id, record->EventID); ok(record->EventType == read_write[i].evt_type, "Expected %d, got %d\n", read_write[i].evt_type, record->EventType); ok(record->NumStrings == read_write[i].evt_numstrings, @@ -1028,15 +1028,15 @@ static void test_readwrite(void) if (run_sidtests) { - ok(record->UserSidLength == sidsize, "Expected %d, got %d\n", sidsize, record->UserSidLength); + ok(record->UserSidLength == sidsize, "Expected %ld, got %ld\n", sidsize, record->UserSidLength); } else { ok(record->StringOffset == record->UserSidOffset, "Expected offsets to be the same\n"); - ok(record->UserSidLength == 0, "Expected 0, got %d\n", record->UserSidLength); + ok(record->UserSidLength == 0, "Expected 0, got %ld\n", record->UserSidLength); } - ok(record->DataLength == 0, "Expected 0, got %d\n", record->DataLength); + ok(record->DataLength == 0, "Expected 0, got %ld\n", record->DataLength); ptr = (char *)((BYTE *)buf + record->StringOffset); for (k = 0; k < record->NumStrings; k++) @@ -1055,16 +1055,16 @@ static void test_readwrite(void) /* Test clearing a real eventlog */ handle = OpenEventLogA(NULL, eventlogname); - ok(handle != NULL, "Failed to open Event Log, got %d\n", GetLastError()); + ok(handle != NULL, "Failed to open Event Log, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ClearEventLogA(handle, NULL); - ok(ret, "Expected success : %d\n", GetLastError()); + ok(ret, "Expected success : %ld\n", GetLastError()); count = 0xdeadbeef; ret = GetNumberOfEventLogRecords(handle, &count); - ok(ret, "Expected success : %d\n", GetLastError()); - ok(count == 0, "Expected an empty eventlog, got %d records\n", count); + ok(ret, "Expected success : %ld\n", GetLastError()); + ok(count == 0, "Expected an empty eventlog, got %ld records\n", count); CloseEventLog(handle); @@ -1111,7 +1111,7 @@ static void test_autocreation(void) { char sources_verify[sizeof(eventsources)]; - ok(type == REG_MULTI_SZ, "Expected a REG_MULTI_SZ, got %d\n", type); + ok(type == REG_MULTI_SZ, "Expected a REG_MULTI_SZ, got %ld\n", type); /* Build the expected string */ memset(sources_verify, 0, sizeof(sources_verify)); @@ -1124,7 +1124,7 @@ static void test_autocreation(void) lstrcpyA(p, eventlogname); ok(!memcmp(sources, sources_verify, size), - "Expected a correct 'Sources' value (size : %d)\n", size); + "Expected a correct 'Sources' value (size : %ld)\n", size); } RegCloseKey(eventkey); @@ -1179,13 +1179,13 @@ static void cleanup_eventlog(void) RegDeleteValueA(key, "Sources"); RegCloseKey(key); lret = RegDeleteKeyA(HKEY_LOCAL_MACHINE, winesvc); - ok(lret == ERROR_SUCCESS, "Could not delete the registry tree : %d\n", lret); + ok(lret == ERROR_SUCCESS, "Could not delete the registry tree : %ld\n", lret); /* A handle to the eventlog is locked by services.exe. We can only * delete the eventlog file after reboot. */ bret = MoveFileExA(eventlogfile, NULL, MOVEFILE_DELAY_UNTIL_REBOOT); - ok(bret, "Expected MoveFileEx to succeed: %d\n", GetLastError()); + ok(bret, "Expected MoveFileEx to succeed: %ld\n", GetLastError()); } static void test_trace_event_params(void) @@ -1203,25 +1203,25 @@ static void test_trace_event_params(void) } uret = pEventRegister(NULL, NULL, NULL, ®_handle); - todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#x\n", uret); + todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#lx\n", uret); uret = pEventRegister(&test_guid, NULL, NULL, NULL); - ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#x\n", uret); + ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#lx\n", uret); uret = pEventRegister(&test_guid, NULL, NULL, ®_handle); - ok(uret == ERROR_SUCCESS, "EventRegister gave wrong error: %#x\n", uret); + ok(uret == ERROR_SUCCESS, "EventRegister gave wrong error: %#lx\n", uret); uret = pEventWriteString(0, 0, 0, emptyW); - todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventWriteString gave wrong error: %#x\n", uret); + todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventWriteString gave wrong error: %#lx\n", uret); uret = pEventWriteString(reg_handle, 0, 0, NULL); - todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventWriteString gave wrong error: %#x\n", uret); + todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventWriteString gave wrong error: %#lx\n", uret); uret = pEventUnregister(0); - todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventUnregister gave wrong error: %#x\n", uret); + todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventUnregister gave wrong error: %#lx\n", uret); uret = pEventUnregister(reg_handle); - ok(uret == ERROR_SUCCESS, "EventUnregister gave wrong error: %#x\n", uret); + ok(uret == ERROR_SUCCESS, "EventUnregister gave wrong error: %#lx\n", uret); } static void test_start_trace(void) @@ -1248,37 +1248,37 @@ static void test_start_trace(void) todo_wine ok(ret == ERROR_BAD_LENGTH || ret == ERROR_INVALID_PARAMETER, /* XP and 2k3 */ - "Expected ERROR_BAD_LENGTH, got %d\n", ret); + "Expected ERROR_BAD_LENGTH, got %ld\n", ret); properties->Wnode.BufferSize = buffersize; ret = StartTraceA(&handle, "this name is too long", properties); todo_wine - ok(ret == ERROR_BAD_LENGTH, "Expected ERROR_BAD_LENGTH, got %d\n", ret); + ok(ret == ERROR_BAD_LENGTH, "Expected ERROR_BAD_LENGTH, got %ld\n", ret); ret = StartTraceA(&handle, sessionname, NULL); todo_wine - ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret); ret = StartTraceA(NULL, sessionname, properties); todo_wine - ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret); properties->LogFileNameOffset = 1; ret = StartTraceA(&handle, sessionname, properties); todo_wine - ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret); properties->LogFileNameOffset = sizeof(EVENT_TRACE_PROPERTIES) + sizeof(sessionname); properties->LoggerNameOffset = 1; ret = StartTraceA(&handle, sessionname, properties); todo_wine - ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret); properties->LoggerNameOffset = sizeof(EVENT_TRACE_PROPERTIES); properties->LogFileMode = EVENT_TRACE_FILE_MODE_SEQUENTIAL | EVENT_TRACE_FILE_MODE_CIRCULAR; ret = StartTraceA(&handle, sessionname, properties); todo_wine - ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret); properties->LogFileMode = EVENT_TRACE_FILE_MODE_NONE; /* XP creates a file we can't delete, so change the filepath to something else */ strcpy((char *)properties + properties->LogFileNameOffset, filepath2); @@ -1286,13 +1286,13 @@ static void test_start_trace(void) properties->Wnode.Guid = SystemTraceControlGuid; ret = StartTraceA(&handle, sessionname, properties); todo_wine - ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret); memset(&properties->Wnode.Guid, 0, sizeof(properties->Wnode.Guid)); properties->LogFileNameOffset = 0; ret = StartTraceA(&handle, sessionname, properties); todo_wine - ok(ret == ERROR_BAD_PATHNAME, "Expected ERROR_BAD_PATHNAME, got %d\n", ret); + ok(ret == ERROR_BAD_PATHNAME, "Expected ERROR_BAD_PATHNAME, got %ld\n", ret); properties->LogFileNameOffset = sizeof(EVENT_TRACE_PROPERTIES) + sizeof(sessionname); ret = StartTraceA(&handle, sessionname, properties); @@ -1301,13 +1301,13 @@ static void test_start_trace(void) skip("need admin rights\n"); goto done; } - ok(ret == ERROR_SUCCESS, "Expected success, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected success, got %ld\n", ret); ret = StartTraceA(&handle, sessionname, properties); todo_wine ok(ret == ERROR_ALREADY_EXISTS || ret == ERROR_SHARING_VIOLATION, /* 2k3 */ - "Expected ERROR_ALREADY_EXISTS, got %d\n", ret); + "Expected ERROR_ALREADY_EXISTS, got %ld\n", ret); /* clean up */ ControlTraceA(handle, sessionname, properties, EVENT_TRACE_CONTROL_STOP); diff --git a/dlls/advapi32/tests/lsa.c b/dlls/advapi32/tests/lsa.c index f8c822a7de2..5c00298d41e 100644 --- a/dlls/advapi32/tests/lsa.c +++ b/dlls/advapi32/tests/lsa.c @@ -52,13 +52,13 @@ static void test_lsa(void) status = LsaOpenPolicy( NULL, &object_attributes, POLICY_ALL_ACCESS, &handle); ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED, - "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08x\n", status); + "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08lx\n", status); /* try a more restricted access mask if necessary */ if (status == STATUS_ACCESS_DENIED) { trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES\n"); status = LsaOpenPolicy( NULL, &object_attributes, POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES, &handle); - ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES) returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES) returned 0x%08lx\n", status); } if (status == STATUS_SUCCESS) { @@ -73,12 +73,12 @@ static void test_lsa(void) if (status == STATUS_ACCESS_DENIED) skip("Not enough rights to retrieve PolicyAuditEventsInformation\n"); else - ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAuditEventsInformation) failed, returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAuditEventsInformation) failed, returned 0x%08lx\n", status); if (status == STATUS_SUCCESS) LsaFreeMemory(audit_events_info); status = LsaQueryInformationPolicy(handle, PolicyPrimaryDomainInformation, (void **)&primary_domain_info); - ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyPrimaryDomainInformation) failed, returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyPrimaryDomainInformation) failed, returned 0x%08lx\n", status); if (status == STATUS_SUCCESS) { if (primary_domain_info->Sid) { LPSTR strsid; @@ -105,14 +105,14 @@ static void test_lsa(void) } status = LsaQueryInformationPolicy(handle, PolicyAccountDomainInformation, (void **)&account_domain_info); - ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAccountDomainInformation) failed, returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAccountDomainInformation) failed, returned 0x%08lx\n", status); if (status == STATUS_SUCCESS) LsaFreeMemory(account_domain_info); /* This isn't supported in NT4 */ status = LsaQueryInformationPolicy(handle, PolicyDnsDomainInformation, (void **)&dns_domain_info); ok(status == STATUS_SUCCESS || status == STATUS_INVALID_PARAMETER, - "LsaQueryInformationPolicy(PolicyDnsDomainInformation) failed, returned 0x%08x\n", status); + "LsaQueryInformationPolicy(PolicyDnsDomainInformation) failed, returned 0x%08lx\n", status); if (status == STATUS_SUCCESS) { if (dns_domain_info->Sid || !IsEqualGUID(&dns_domain_info->DomainGuid, &GUID_NULL)) { LPSTR strsid = NULL; @@ -159,15 +159,15 @@ static void test_lsa(void) /* We need a valid SID to pass to LsaEnumerateAccountRights */ ret = OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY, &token ); - ok(ret, "Unable to obtain process token, error %u\n", GetLastError( )); + ok(ret, "Unable to obtain process token, error %lu\n", GetLastError( )); if (ret) { char buffer[64]; DWORD len; TOKEN_USER *token_user = (TOKEN_USER *) buffer; ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, sizeof(buffer), &len ); - ok(ret || GetLastError( ) == ERROR_INSUFFICIENT_BUFFER, "Unable to obtain token information, error %u\n", GetLastError( )); + ok(ret || GetLastError( ) == ERROR_INSUFFICIENT_BUFFER, "Unable to obtain token information, error %lu\n", GetLastError( )); if (! ret && GetLastError( ) == ERROR_INSUFFICIENT_BUFFER) { - trace("Resizing buffer to %u.\n", len); + trace("Resizing buffer to %lu.\n", len); token_user = LocalAlloc( 0, len ); if (token_user != NULL) ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, len, &len ); @@ -179,7 +179,7 @@ static void test_lsa(void) rights = (PLSA_UNICODE_STRING) 0xdeadbeaf; rights_count = 0xcafecafe; status = LsaEnumerateAccountRights(handle, token_user->User.Sid, &rights, &rights_count); - ok(status == STATUS_SUCCESS || status == STATUS_OBJECT_NAME_NOT_FOUND, "Unexpected status 0x%x\n", status); + ok(status == STATUS_SUCCESS || status == STATUS_OBJECT_NAME_NOT_FOUND, "Unexpected status 0x%lx\n", status); if (status == STATUS_SUCCESS) LsaFreeMemory( rights ); else @@ -191,7 +191,7 @@ static void test_lsa(void) } status = LsaClose(handle); - ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08lx\n", status); } } @@ -208,7 +208,7 @@ static void get_sid_info(PSID psid, LPSTR *user, LPSTR *dom) user_size = dom_size = 257; account[0] = domain[0] = 0; ret = LookupAccountSidA(NULL, psid, account, &user_size, domain, &dom_size, &use); - ok(ret, "LookupAccountSidA failed %u\n", GetLastError()); + ok(ret, "LookupAccountSidA failed %lu\n", GetLastError()); } static void test_LsaLookupNames2(void) @@ -236,14 +236,14 @@ static void test_LsaLookupNames2(void) status = LsaOpenPolicy(NULL, &attrs, POLICY_ALL_ACCESS, &handle); ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED, - "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08x\n", status); + "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08lx\n", status); /* try a more restricted access mask if necessary */ if (status == STATUS_ACCESS_DENIED) { trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION\n"); status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &handle); - ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION) returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION) returned 0x%08lx\n", status); } if (status != STATUS_SUCCESS) { @@ -267,10 +267,10 @@ static void test_LsaLookupNames2(void) sids = NULL; domains = NULL; status = LsaLookupNames2(handle, 0, 1, &name[0], &domains, &sids); - ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %x)\n", status); + ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %lx)\n", status); ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use); - ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags); - ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries); + ok(sids[0].Flags == 0, "expected 0, got 0x%08lx\n", sids[0].Flags); + ok(domains->Entries == 1, "expected 1, got %lu\n", domains->Entries); get_sid_info(sids[0].Sid, &account, &sid_dom); ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account); ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom); @@ -281,10 +281,10 @@ static void test_LsaLookupNames2(void) sids = NULL; domains = NULL; status = LsaLookupNames2(handle, 0, 1, &name[1], &domains, &sids); - ok(status == STATUS_NONE_MAPPED, "expected STATUS_NONE_MAPPED, got %x)\n", status); + ok(status == STATUS_NONE_MAPPED, "expected STATUS_NONE_MAPPED, got %lx)\n", status); ok(sids[0].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[0].Use); - ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags); - ok(domains->Entries == 0, "expected 0, got %u\n", domains->Entries); + ok(sids[0].Flags == 0, "expected 0, got 0x%08lx\n", sids[0].Flags); + ok(domains->Entries == 0, "expected 0, got %lu\n", domains->Entries); LsaFreeMemory(sids); LsaFreeMemory(domains); @@ -292,10 +292,10 @@ static void test_LsaLookupNames2(void) sids = NULL; domains = NULL; status = LsaLookupNames2(handle, 0, 1, &name[2], &domains, &sids); - ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %x)\n", status); + ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %lx)\n", status); ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use); - ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags); - ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries); + ok(sids[0].Flags == 0, "expected 0, got 0x%08lx\n", sids[0].Flags); + ok(domains->Entries == 1, "expected 1, got %lu\n", domains->Entries); get_sid_info(sids[0].Sid, &account, &sid_dom); ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account); ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom); @@ -306,12 +306,12 @@ static void test_LsaLookupNames2(void) sids = NULL; domains = NULL; status = LsaLookupNames2(handle, 0, 3, name, &domains, &sids); - ok(status == STATUS_SOME_NOT_MAPPED, "expected STATUS_SOME_NOT_MAPPED, got %x)\n", status); + ok(status == STATUS_SOME_NOT_MAPPED, "expected STATUS_SOME_NOT_MAPPED, got %lx)\n", status); ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use); ok(sids[1].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[1].Use); ok(sids[2].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[2].Use); - ok(sids[0].DomainIndex == 0, "expected 0, got %u\n", sids[0].DomainIndex); - ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries); + ok(sids[0].DomainIndex == 0, "expected 0, got %lu\n", sids[0].DomainIndex); + ok(domains->Entries == 1, "expected 1, got %lu\n", domains->Entries); LsaFreeMemory(sids); LsaFreeMemory(domains); @@ -320,15 +320,15 @@ static void test_LsaLookupNames2(void) HeapFree(GetProcessHeap(), 0, name[2].Buffer); status = LsaClose(handle); - ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08lx\n", status); } static void check_unicode_string_(int line, const LSA_UNICODE_STRING *string, const WCHAR *expect) { ok_(__FILE__, line)(string->Length == wcslen(string->Buffer) * sizeof(WCHAR), - "expected %u, got %u\n", wcslen(string->Buffer) * sizeof(WCHAR), string->Length); + "expected %Iu, got %u\n", wcslen(string->Buffer) * sizeof(WCHAR), string->Length); ok_(__FILE__, line)(string->MaximumLength == string->Length + sizeof(WCHAR), - "expected %u, got %u\n", string->Length + sizeof(WCHAR), string->MaximumLength); + "expected %Iu, got %u\n", string->Length + sizeof(WCHAR), string->MaximumLength); ok_(__FILE__, line)(!wcsicmp(string->Buffer, expect), "expected %s, got %s\n", debugstr_w(expect), debugstr_w(string->Buffer)); } @@ -351,30 +351,30 @@ static void test_LsaLookupSids(void) PSID sid; status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy); - ok(status == STATUS_SUCCESS, "got 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status); ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &token); - ok(ret, "OpenProcessToken() failed, error %u\n", GetLastError()); + ok(ret, "OpenProcessToken() failed, error %lu\n", GetLastError()); ret = GetTokenInformation(token, TokenUser, user, sizeof(user_buffer), &size); - ok(ret, "GetTokenInformation() failed, error %u\n", GetLastError()); + ok(ret, "GetTokenInformation() failed, error %lu\n", GetLastError()); size = ARRAY_SIZE(computer_name); ret = GetComputerNameW(computer_name, &size); - ok(ret, "GetComputerName() failed, error %u\n", GetLastError()); + ok(ret, "GetComputerName() failed, error %lu\n", GetLastError()); size = ARRAY_SIZE(user_name); ret = GetUserNameW(user_name, &size); - ok(ret, "GetUserName() failed, error %u\n", GetLastError()); + ok(ret, "GetUserName() failed, error %lu\n", GetLastError()); status = LsaLookupSids(policy, 1, &user->User.Sid, &list, &names); - ok(status == STATUS_SUCCESS, "got 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status); - ok(list->Entries == 1, "got %d\n", list->Entries); + ok(list->Entries == 1, "got %ld\n", list->Entries); check_unicode_string(&list->Domains[0].Name, computer_name); ok(names[0].Use == SidTypeUser, "got type %u\n", names[0].Use); - ok(!names[0].DomainIndex, "got index %u\n", names[0].DomainIndex); + ok(!names[0].DomainIndex, "got index %lu\n", names[0].DomainIndex); check_unicode_string(&names[0].Name, user_name); LsaFreeMemory(names); @@ -382,16 +382,16 @@ static void test_LsaLookupSids(void) CloseHandle(token); ret = ConvertStringSidToSidA("S-1-1-0", &sid); - ok(ret, "ConvertStringSidToSidA() failed, error %u\n", GetLastError()); + ok(ret, "ConvertStringSidToSidA() failed, error %lu\n", GetLastError()); status = LsaLookupSids(policy, 1, &sid, &list, &names); - ok(status == STATUS_SUCCESS, "got 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status); - ok(list->Entries == 1, "got %d\n", list->Entries); + ok(list->Entries == 1, "got %ld\n", list->Entries); check_unicode_string(&list->Domains[0].Name, L""); ok(names[0].Use == SidTypeWellKnownGroup, "got type %u\n", names[0].Use); - ok(!names[0].DomainIndex, "got index %u\n", names[0].DomainIndex); + ok(!names[0].DomainIndex, "got index %lu\n", names[0].DomainIndex); /* The group name gets translated... but not in all locales */ size = ARRAY_SIZE(langW); @@ -413,15 +413,15 @@ static void test_LsaLookupSids(void) FreeSid(sid); ret = ConvertStringSidToSidA("S-1-1234-5678-1234-5678", &sid); - ok(ret, "ConvertStringSidToSidA() failed, error %u\n", GetLastError()); + ok(ret, "ConvertStringSidToSidA() failed, error %lu\n", GetLastError()); status = LsaLookupSids(policy, 1, &sid, &list, &names); - ok(status == STATUS_NONE_MAPPED, "got 0x%08x\n", status); + ok(status == STATUS_NONE_MAPPED, "got 0x%08lx\n", status); - ok(!list->Entries, "got %d\n", list->Entries); + ok(!list->Entries, "got %ld\n", list->Entries); ok(names[0].Use == SidTypeUnknown, "got type %u\n", names[0].Use); - ok(names[0].DomainIndex == -1, "got index %u\n", names[0].DomainIndex); + ok(names[0].DomainIndex == -1, "got index %lu\n", names[0].DomainIndex); check_unicode_string(&names[0].Name, L"S-1-1234-5678-1234-5678"); LsaFreeMemory(names); @@ -429,7 +429,7 @@ static void test_LsaLookupSids(void) FreeSid(sid); status = LsaClose(policy); - ok(status == STATUS_SUCCESS, "got 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status); } static void test_LsaLookupPrivilegeName(void) @@ -444,24 +444,24 @@ static void test_LsaLookupPrivilegeName(void) attrs.Length = sizeof(attrs); status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy); - ok(status == STATUS_SUCCESS, "Failed to open policy, %#x.\n", status); + ok(status == STATUS_SUCCESS, "Failed to open policy, %#lx.\n", status); name = (void *)0xdeadbeef; status = LsaLookupPrivilegeName(policy, NULL, &name); - ok(status != STATUS_SUCCESS, "Unexpected status %#x.\n", status); + ok(status != STATUS_SUCCESS, "Unexpected status %#lx.\n", status); ok(name == (void *)0xdeadbeef, "Unexpected name pointer.\n"); name = (void *)0xdeadbeef; luid.HighPart = 1; luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE; status = LsaLookupPrivilegeName(policy, &luid, &name); - ok(status == STATUS_NO_SUCH_PRIVILEGE, "Unexpected status %#x.\n", status); + ok(status == STATUS_NO_SUCH_PRIVILEGE, "Unexpected status %#lx.\n", status); ok(name == NULL, "Unexpected name pointer.\n"); luid.HighPart = 0; luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE; status = LsaLookupPrivilegeName(policy, &luid, &name); - ok(status == 0, "got %#x.\n", status); + ok(status == 0, "got %#lx.\n", status); LsaFreeMemory(name); } @@ -481,11 +481,11 @@ static void test_LsaGetUserName(void) size = ARRAY_SIZE(user); ret = GetUserNameW(user, &size); - ok(ret, "GetUserName error %u\n", GetLastError()); + ok(ret, "GetUserName error %lu\n", GetLastError()); size = ARRAY_SIZE(computer); ret = GetComputerNameW(computer, &size); - ok(ret, "GetComputerName error %u\n", GetLastError()); + ok(ret, "GetComputerName error %lu\n", GetLastError()); if (0) /* crashes under Windows */ status = pLsaGetUserName(NULL, NULL); @@ -494,12 +494,12 @@ static void test_LsaGetUserName(void) status = pLsaGetUserName(NULL, &lsa_domain); status = pLsaGetUserName(&lsa_user, NULL); - ok(!status, "got %#x\n", status); + ok(!status, "got %#lx\n", status); check_unicode_string(lsa_user, user); LsaFreeMemory(lsa_user); status = pLsaGetUserName(&lsa_user, &lsa_domain); - ok(!status, "got %#x\n", status); + ok(!status, "got %#lx\n", status); ok(!lstrcmpW(user, lsa_user->Buffer), "%s != %s\n", wine_dbgstr_w(user), wine_dbgstr_wn(lsa_user->Buffer, lsa_user->Length/sizeof(WCHAR))); check_unicode_string(lsa_user, user); check_unicode_string(lsa_domain, computer); diff --git a/dlls/advapi32/tests/perf.c b/dlls/advapi32/tests/perf.c index a0862e65ea4..fc07a09d327 100644 --- a/dlls/advapi32/tests/perf.c +++ b/dlls/advapi32/tests/perf.c @@ -64,26 +64,26 @@ void test_provider_init(void) prov = (HANDLE)0xdeadbeef; ret = PerfStartProvider(NULL, test_provider_callback, &prov); - ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret); ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov); prov = (HANDLE)0xdeadbeef; ret = PerfStartProvider(&test_guid, test_provider_callback, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret); ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov); prov = (HANDLE)0xdeadbeef; ret = PerfStartProvider(&test_guid, test_provider_callback, &prov); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); ok(prov != (HANDLE)0xdeadbeef, "Provider handle is not set.\n"); prov2 = prov; ret = PerfStartProvider(&test_guid, test_provider_callback, &prov2); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); ok(prov2 != prov, "Got the same provider handle.\n"); ret = PerfStopProvider(prov2); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); if (0) { @@ -93,7 +93,7 @@ void test_provider_init(void) /* Provider handle is a pointer and not a kernel object handle. */ bret = DuplicateHandle(GetCurrentProcess(), prov, GetCurrentProcess(), &prov2, 0, FALSE, DUPLICATE_SAME_ACCESS); - ok(!bret && GetLastError() == ERROR_INVALID_HANDLE, "Got unexpected bret %d, err %u.\n", bret, GetLastError()); + ok(!bret && GetLastError() == ERROR_INVALID_HANDLE, "Got unexpected bret %d, err %lu.\n", bret, GetLastError()); bret = IsBadWritePtr(prov, 8); ok(!bret, "Handle does not point to the data.\n"); @@ -102,14 +102,14 @@ void test_provider_init(void) pc_template.counterset.NumCounters = 0; pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE; ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template.counterset)); - ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret); pc_template.counterset.CounterSetGuid = test_set_guid; pc_template.counterset.ProviderGuid = test_guid; pc_template.counterset.NumCounters = 2; pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE; ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template)); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); pc_template.counterset.CounterSetGuid = test_set_guid2; /* Looks like ProviderGuid doesn't need to match provider. */ @@ -117,50 +117,50 @@ void test_provider_init(void) pc_template.counterset.NumCounters = 1; pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE; ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template)); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template)); - ok(ret == ERROR_ALREADY_EXISTS, "Got unexpected ret %u.\n", ret); + ok(ret == ERROR_ALREADY_EXISTS, "Got unexpected ret %lu.\n", ret); SetLastError(0xdeadbeef); instance = PerfCreateInstance(prov, NULL, L"1", 1); ok(!instance, "Got unexpected instance %p.\n", instance); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %u.\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %lu.\n", GetLastError()); SetLastError(0xdeadbeef); instance = PerfCreateInstance(prov, &test_guid, L"1", 1); ok(!instance, "Got unexpected instance %p.\n", instance); - ok(GetLastError() == ERROR_NOT_FOUND, "Got unexpected error %u.\n", GetLastError()); + ok(GetLastError() == ERROR_NOT_FOUND, "Got unexpected error %lu.\n", GetLastError()); SetLastError(0xdeadbeef); instance = PerfCreateInstance(prov, &test_guid, NULL, 1); ok(!instance, "Got unexpected instance %p.\n", instance); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %u.\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %lu.\n", GetLastError()); SetLastError(0xdeadbeef); instance = PerfCreateInstance(prov, &test_set_guid, L"11", 1); ok(!!instance, "Got NULL instance.\n"); - ok(GetLastError() == 0xdeadbeef, "Got unexpected error %u.\n", GetLastError()); - ok(instance->InstanceId == 1, "Got unexpected InstanceId %u.\n", instance->InstanceId); - ok(instance->InstanceNameSize == 6, "Got unexpected InstanceNameSize %u.\n", instance->InstanceNameSize); + ok(GetLastError() == 0xdeadbeef, "Got unexpected error %lu.\n", GetLastError()); + ok(instance->InstanceId == 1, "Got unexpected InstanceId %lu.\n", instance->InstanceId); + ok(instance->InstanceNameSize == 6, "Got unexpected InstanceNameSize %lu.\n", instance->InstanceNameSize); ok(IsEqualGUID(&instance->CounterSetGuid, &test_set_guid), "Got unexpected guid %s.\n", debugstr_guid(&instance->CounterSetGuid)); ok(instance->InstanceNameOffset == sizeof(*instance) + sizeof(UINT64) * 2, - "Got unexpected InstanceNameOffset %u.\n", instance->InstanceNameOffset); + "Got unexpected InstanceNameOffset %lu.\n", instance->InstanceNameOffset); ok(!lstrcmpW((WCHAR *)((BYTE *)instance + instance->InstanceNameOffset), L"11"), "Got unexpected instance name %s.\n", debugstr_w((WCHAR *)((BYTE *)instance + instance->InstanceNameOffset))); size = ((sizeof(*instance) + sizeof(UINT64) * 2 + instance->InstanceNameSize) + 7) & ~7; - ok(size == instance->dwSize, "Got unexpected size %u, instance->dwSize %u.\n", size, instance->dwSize); + ok(size == instance->dwSize, "Got unexpected size %lu, instance->dwSize %lu.\n", size, instance->dwSize); ret = PerfSetCounterRefValue(prov, instance, 1, &counter1); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); ret = PerfSetCounterRefValue(prov, instance, 2, &counter2); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); ret = PerfSetCounterRefValue(prov, instance, 0, &counter2); - ok(ret == ERROR_NOT_FOUND, "Got unexpected ret %u.\n", ret); + ok(ret == ERROR_NOT_FOUND, "Got unexpected ret %lu.\n", ret); ok(*(void **)(instance + 1) == &counter1, "Got unexpected counter value %p.\n", *(void **)(instance + 1)); @@ -168,24 +168,24 @@ void test_provider_init(void) "Got unexpected counter value %p.\n", *(void **)(instance + 1)); ret = PerfDeleteInstance(prov, instance); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); ret = PerfStopProvider(prov); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); memset( &prov_context, 0, sizeof(prov_context) ); prov = (HANDLE)0xdeadbeef; ret = PerfStartProviderEx( &test_guid, &prov_context, &prov ); - ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret); ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov); prov_context.ContextSize = sizeof(prov_context) + 1; ret = PerfStartProviderEx( &test_guid, &prov_context, &prov ); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); ok(prov != (HANDLE)0xdeadbeef, "Provider handle is not set.\n"); ret = PerfStopProvider(prov); - ok(!ret, "Got unexpected ret %u.\n", ret); + ok(!ret, "Got unexpected ret %lu.\n", ret); } START_TEST(perf) diff --git a/dlls/advapi32/tests/registry.c b/dlls/advapi32/tests/registry.c index af4ed1e8465..6152a313803 100644 --- a/dlls/advapi32/tests/registry.c +++ b/dlls/advapi32/tests/registry.c @@ -134,7 +134,7 @@ static void setup_main_key(void) if (!RegOpenKeyA( HKEY_CURRENT_USER, "Software\\Wine\\Test", &hkey_main )) delete_key( hkey_main ); ret = RegCreateKeyA( HKEY_CURRENT_USER, "Software\\Wine\\Test", &hkey_main ); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); } static void check_user_privs(void) @@ -143,7 +143,7 @@ static void check_user_privs(void) HKEY hkey = (HKEY)0xdeadbeef; ret = RegOpenKeyExA( HKEY_LOCAL_MACHINE, "Software", 0, KEY_READ|KEY_WRITE, &hkey); - ok(ret == ERROR_SUCCESS || ret == ERROR_ACCESS_DENIED, "expected success or access denied, got %i\n", ret); + ok(ret == ERROR_SUCCESS || ret == ERROR_ACCESS_DENIED, "expected success or access denied, got %li\n", ret); if (ret == ERROR_SUCCESS) { ok(hkey != NULL, "RegOpenKeyExA succeeded but returned NULL hkey\n"); @@ -174,32 +174,32 @@ static void _test_hkey_main_Value_A(int line, LPCSTR name, LPCSTR string, SetLastError(0xdeadbeef); ret = RegQueryValueExA(hkey_main, name, NULL, &type, NULL, &cbData); GLE = GetLastError(); - lok(ret == ERROR_SUCCESS, "RegQueryValueExA/1 failed: %d, GLE=%d\n", ret, GLE); + lok(ret == ERROR_SUCCESS, "RegQueryValueExA/1 failed: %ld, GLE=%ld\n", ret, GLE); /* It is wrong for the Ansi version to not be implemented */ - ok(GLE == 0xdeadbeef, "RegQueryValueExA set GLE = %u\n", GLE); + ok(GLE == 0xdeadbeef, "RegQueryValueExA set GLE = %lu\n", GLE); if(GLE == ERROR_CALL_NOT_IMPLEMENTED) return; str_byte_len = (string ? lstrlenA(string) : 0) + 1; - lok(type == REG_SZ, "RegQueryValueExA/1 returned type %d\n", type); - lok(cbData == full_byte_len, "cbData=%d instead of %d or %d\n", cbData, full_byte_len, str_byte_len); + lok(type == REG_SZ, "RegQueryValueExA/1 returned type %ld\n", type); + lok(cbData == full_byte_len, "cbData=%ld instead of %ld or %ld\n", cbData, full_byte_len, str_byte_len); value = HeapAlloc(GetProcessHeap(), 0, cbData+1); memset(value, 0xbd, cbData+1); type=0xdeadbeef; ret = RegQueryValueExA(hkey_main, name, NULL, &type, value, &cbData); GLE = GetLastError(); - lok(ret == ERROR_SUCCESS, "RegQueryValueExA/2 failed: %d, GLE=%d\n", ret, GLE); + lok(ret == ERROR_SUCCESS, "RegQueryValueExA/2 failed: %ld, GLE=%ld\n", ret, GLE); if (!string) { /* When cbData == 0, RegQueryValueExA() should not modify the buffer */ - lok(*value == 0xbd, "RegQueryValueExA overflowed: cbData=%u *value=%02x\n", cbData, *value); + lok(*value == 0xbd, "RegQueryValueExA overflowed: cbData=%lu *value=%02x\n", cbData, *value); } else { - lok(memcmp(value, string, cbData) == 0, "RegQueryValueExA/2 failed: %s/%d != %s/%d\n", + lok(memcmp(value, string, cbData) == 0, "RegQueryValueExA/2 failed: %s/%ld != %s/%ld\n", debugstr_an((char*)value, cbData), cbData, debugstr_an(string, full_byte_len), full_byte_len); - lok(*(value+cbData) == 0xbd, "RegQueryValueExA/2 overflowed at offset %u: %02x != bd\n", cbData, *(value+cbData)); + lok(*(value+cbData) == 0xbd, "RegQueryValueExA/2 overflowed at offset %lu: %02x != bd\n", cbData, *(value+cbData)); } HeapFree(GetProcessHeap(), 0, value); } @@ -219,16 +219,16 @@ static void _test_hkey_main_Value_W(int line, LPCWSTR name, LPCWSTR string, SetLastError(0xdeadbeef); ret = RegQueryValueExW(hkey_main, name, NULL, &type, NULL, &cbData); GLE = GetLastError(); - lok(ret == ERROR_SUCCESS, "RegQueryValueExW/1 failed: %d, GLE=%d\n", ret, GLE); + lok(ret == ERROR_SUCCESS, "RegQueryValueExW/1 failed: %ld, GLE=%ld\n", ret, GLE); if(GLE == ERROR_CALL_NOT_IMPLEMENTED) { win_skip("RegQueryValueExW() is not implemented\n"); return; } - lok(type == REG_SZ, "RegQueryValueExW/1 returned type %d\n", type); + lok(type == REG_SZ, "RegQueryValueExW/1 returned type %ld\n", type); lok(cbData == full_byte_len, - "cbData=%d instead of %d\n", cbData, full_byte_len); + "cbData=%ld instead of %ld\n", cbData, full_byte_len); /* Give enough space to overflow by one WCHAR */ value = HeapAlloc(GetProcessHeap(), 0, cbData+2); @@ -236,16 +236,16 @@ static void _test_hkey_main_Value_W(int line, LPCWSTR name, LPCWSTR string, type=0xdeadbeef; ret = RegQueryValueExW(hkey_main, name, NULL, &type, value, &cbData); GLE = GetLastError(); - lok(ret == ERROR_SUCCESS, "RegQueryValueExW/2 failed: %d, GLE=%d\n", ret, GLE); + lok(ret == ERROR_SUCCESS, "RegQueryValueExW/2 failed: %ld, GLE=%ld\n", ret, GLE); if (string) { - lok(memcmp(value, string, cbData) == 0, "RegQueryValueExW failed: %s/%d != %s/%d\n", + lok(memcmp(value, string, cbData) == 0, "RegQueryValueExW failed: %s/%ld != %s/%ld\n", wine_dbgstr_wn((WCHAR*)value, cbData / sizeof(WCHAR)), cbData, wine_dbgstr_wn(string, full_byte_len / sizeof(WCHAR)), full_byte_len); } /* This implies that when cbData == 0, RegQueryValueExW() should not modify the buffer */ - lok(*(value+cbData) == 0xbd, "RegQueryValueExW/2 overflowed at %u: %02x != bd\n", cbData, *(value+cbData)); - lok(*(value+cbData+1) == 0xbd, "RegQueryValueExW/2 overflowed at %u+1: %02x != bd\n", cbData, *(value+cbData+1)); + lok(*(value+cbData) == 0xbd, "RegQueryValueExW/2 overflowed at %lu: %02x != bd\n", cbData, *(value+cbData)); + lok(*(value+cbData+1) == 0xbd, "RegQueryValueExW/2 overflowed at %lu+1: %02x != bd\n", cbData, *(value+cbData+1)); HeapFree(GetProcessHeap(), 0, value); } @@ -271,65 +271,65 @@ static void test_set_value(void) { /* Crashes on NT4, Windows 2000 and XP SP1 */ ret = RegSetValueA(hkey_main, NULL, REG_SZ, NULL, 0); - ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueA should have failed with ERROR_INVALID_PARAMETER instead of %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", ret); } ret = RegSetValueA(hkey_main, NULL, REG_SZ, string1A, sizeof(string1A)); - ok(ret == ERROR_SUCCESS, "RegSetValueA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(NULL, string1A, sizeof(string1A)); test_hkey_main_Value_W(NULL, string1W, sizeof(string1W)); /* RegSetValueA ignores the size passed in */ ret = RegSetValueA(hkey_main, NULL, REG_SZ, string1A, 4); - ok(ret == ERROR_SUCCESS, "RegSetValueA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(NULL, string1A, sizeof(string1A)); test_hkey_main_Value_W(NULL, string1W, sizeof(string1W)); /* stops at first null */ ret = RegSetValueA(hkey_main, NULL, REG_SZ, string2A, sizeof(string2A)); - ok(ret == ERROR_SUCCESS, "RegSetValueA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(NULL, substring2A, sizeof(substring2A)); test_hkey_main_Value_W(NULL, substring2W, sizeof(substring2W)); /* only REG_SZ is supported on NT*/ ret = RegSetValueA(hkey_main, NULL, REG_BINARY, string2A, sizeof(string2A)); - ok(ret == ERROR_INVALID_PARAMETER, "got %d (expected ERROR_INVALID_PARAMETER)\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "got %ld (expected ERROR_INVALID_PARAMETER)\n", ret); ret = RegSetValueA(hkey_main, NULL, REG_EXPAND_SZ, string2A, sizeof(string2A)); - ok(ret == ERROR_INVALID_PARAMETER, "got %d (expected ERROR_INVALID_PARAMETER)\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "got %ld (expected ERROR_INVALID_PARAMETER)\n", ret); ret = RegSetValueA(hkey_main, NULL, REG_MULTI_SZ, string2A, sizeof(string2A)); - ok(ret == ERROR_INVALID_PARAMETER, "got %d (expected ERROR_INVALID_PARAMETER)\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "got %ld (expected ERROR_INVALID_PARAMETER)\n", ret); /* Test RegSetValueExA with a 'zero-byte' string (as Office 2003 does). * Surprisingly enough we're supposed to get zero bytes out of it. */ ret = RegSetValueExA(hkey_main, name1A, 0, REG_SZ, (const BYTE *)emptyA, 0); - ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name1A, NULL, 0); test_hkey_main_Value_W(name1W, NULL, 0); /* test RegSetValueExA with an empty string */ ret = RegSetValueExA(hkey_main, name1A, 0, REG_SZ, (const BYTE *)emptyA, sizeof(emptyA)); - ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name1A, emptyA, sizeof(emptyA)); test_hkey_main_Value_W(name1W, emptyW, sizeof(emptyW)); /* test RegSetValueExA with off-by-one size */ ret = RegSetValueExA(hkey_main, name1A, 0, REG_SZ, (const BYTE *)string1A, sizeof(string1A)-sizeof(string1A[0])); - ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name1A, string1A, sizeof(string1A)); test_hkey_main_Value_W(name1W, string1W, sizeof(string1W)); /* test RegSetValueExA with normal string */ ret = RegSetValueExA(hkey_main, name1A, 0, REG_SZ, (const BYTE *)string1A, sizeof(string1A)); - ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name1A, string1A, sizeof(string1A)); test_hkey_main_Value_W(name1W, string1W, sizeof(string1W)); /* test RegSetValueExA with intrazeroed string */ ret = RegSetValueExA(hkey_main, name2A, 0, REG_SZ, (const BYTE *)string2A, sizeof(string2A)); - ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name2A, string2A, sizeof(string2A)); test_hkey_main_Value_W(name2W, string2W, sizeof(string2W)); @@ -337,79 +337,79 @@ static void test_set_value(void) { /* Crashes on NT4, Windows 2000 and XP SP1 */ ret = RegSetValueW(hkey_main, NULL, REG_SZ, NULL, 0); - ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have failed with ERROR_INVALID_PARAMETER instead of %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", ret); RegSetValueExA(hkey_main, name2A, 0, REG_SZ, (const BYTE *)1, 1); RegSetValueExA(hkey_main, name2A, 0, REG_DWORD, (const BYTE *)1, 1); } ret = RegSetValueW(hkey_main, NULL, REG_SZ, string1W, sizeof(string1W)); - ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(NULL, string1A, sizeof(string1A)); test_hkey_main_Value_W(NULL, string1W, sizeof(string1W)); ret = RegSetValueW(hkey_main, name1W, REG_SZ, string1W, sizeof(string1W)); - ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name1A, string1A, sizeof(string1A)); test_hkey_main_Value_W(name1W, string1W, sizeof(string1W)); /* RegSetValueW ignores the size passed in */ ret = RegSetValueW(hkey_main, NULL, REG_SZ, string1W, 4 * sizeof(string1W[0])); - ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(NULL, string1A, sizeof(string1A)); test_hkey_main_Value_W(NULL, string1W, sizeof(string1W)); /* stops at first null */ ret = RegSetValueW(hkey_main, NULL, REG_SZ, string2W, sizeof(string2W)); - ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueW failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(NULL, substring2A, sizeof(substring2A)); test_hkey_main_Value_W(NULL, substring2W, sizeof(substring2W)); /* only REG_SZ is supported */ ret = RegSetValueW(hkey_main, NULL, REG_BINARY, string2W, sizeof(string2W)); - ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have returned ERROR_INVALID_PARAMETER instead of %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have returned ERROR_INVALID_PARAMETER instead of %ld\n", ret); ret = RegSetValueW(hkey_main, NULL, REG_EXPAND_SZ, string2W, sizeof(string2W)); - ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have returned ERROR_INVALID_PARAMETER instead of %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have returned ERROR_INVALID_PARAMETER instead of %ld\n", ret); ret = RegSetValueW(hkey_main, NULL, REG_MULTI_SZ, string2W, sizeof(string2W)); - ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have returned ERROR_INVALID_PARAMETER instead of %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "RegSetValueW should have returned ERROR_INVALID_PARAMETER instead of %ld\n", ret); /* test RegSetValueExW with off-by-one size */ ret = RegSetValueExW(hkey_main, name1W, 0, REG_SZ, (const BYTE *)string1W, sizeof(string1W)-sizeof(string1W[0])); - ok(ret == ERROR_SUCCESS, "RegSetValueExW failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExW failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name1A, string1A, sizeof(string1A)); test_hkey_main_Value_W(name1W, string1W, sizeof(string1W)); /* test RegSetValueExW with normal string */ ret = RegSetValueExW(hkey_main, name1W, 0, REG_SZ, (const BYTE *)string1W, sizeof(string1W)); - ok(ret == ERROR_SUCCESS, "RegSetValueExW failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExW failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name1A, string1A, sizeof(string1A)); test_hkey_main_Value_W(name1W, string1W, sizeof(string1W)); /* test RegSetValueExW with intrazeroed string */ ret = RegSetValueExW(hkey_main, name2W, 0, REG_SZ, (const BYTE *)string2W, sizeof(string2W)); - ok(ret == ERROR_SUCCESS, "RegSetValueExW failed: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_SUCCESS, "RegSetValueExW failed: %ld, GLE=%ld\n", ret, GetLastError()); test_hkey_main_Value_A(name2A, string2A, sizeof(string2A)); test_hkey_main_Value_W(name2W, string2W, sizeof(string2W)); /* test RegSetValueExW with data = 1 */ ret = RegSetValueExW(hkey_main, name2W, 0, REG_SZ, (const BYTE *)1, 1); - ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %ld, GLE=%ld\n", ret, GetLastError()); ret = RegSetValueExW(hkey_main, name2W, 0, REG_DWORD, (const BYTE *)1, 1); - ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %ld, GLE=%ld\n", ret, GetLastError()); if (pRegGetValueA) /* avoid a crash on Windows 2000 */ { ret = RegSetValueExW(hkey_main, NULL, 0, REG_SZ, NULL, 4); - ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %ld, GLE=%ld\n", ret, GetLastError()); ret = RegSetValueExW(hkey_main, NULL, 0, REG_SZ, NULL, 0); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = RegSetValueExW(hkey_main, NULL, 0, REG_DWORD, NULL, 4); - ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %d, GLE=%d\n", ret, GetLastError()); + ok(ret == ERROR_NOACCESS, "RegSetValueExW should have failed with ERROR_NOACCESS: %ld, GLE=%ld\n", ret, GetLastError()); ret = RegSetValueExW(hkey_main, NULL, 0, REG_DWORD, NULL, 0); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); } /* RegSetKeyValue */ @@ -421,29 +421,29 @@ static void test_set_value(void) HKEY subkey; ret = pRegSetKeyValueW(hkey_main, NULL, name1W, REG_SZ, (const BYTE*)string2W, sizeof(string2W)); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); test_hkey_main_Value_A(name1A, string2A, sizeof(string2A)); test_hkey_main_Value_W(name1W, string2W, sizeof(string2W)); ret = pRegSetKeyValueW(hkey_main, L"subkey", name1W, REG_SZ, string1W, sizeof(string1W)); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = RegOpenKeyExW(hkey_main, L"subkey", 0, KEY_QUERY_VALUE, &subkey); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); type = len = 0; ret = RegQueryValueExW(subkey, name1W, 0, &type, NULL, &len); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); - ok(len == sizeof(string1W), "got %d\n", len); - ok(type == REG_SZ, "got type %d\n", type); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); + ok(len == sizeof(string1W), "got %ld\n", len); + ok(type == REG_SZ, "got type %ld\n", type); ret = pRegSetKeyValueW(hkey_main, L"subkey", name1W, REG_SZ, NULL, 0); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = pRegSetKeyValueW(hkey_main, L"subkey", name1W, REG_SZ, NULL, 4); - ok(ret == ERROR_NOACCESS, "got %d\n", ret); + ok(ret == ERROR_NOACCESS, "got %ld\n", ret); ret = pRegSetKeyValueW(hkey_main, L"subkey", name1W, REG_DWORD, NULL, 4); - ok(ret == ERROR_NOACCESS, "got %d\n", ret); + ok(ret == ERROR_NOACCESS, "got %ld\n", ret); RegCloseKey(subkey); } @@ -482,18 +482,18 @@ static void test_enum_value(void) /* create the working key for new 'Test' value */ res = RegCreateKeyA( hkey_main, "TestKey", &test_key ); - ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res); + ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res); /* check NULL data with zero length */ res = RegSetValueExA( test_key, "Test", 0, REG_SZ, NULL, 0 ); if (GetVersion() & 0x80000000) - ok( res == ERROR_INVALID_PARAMETER, "RegSetValueExA returned %d\n", res ); + ok( res == ERROR_INVALID_PARAMETER, "RegSetValueExA returned %ld\n", res ); else - ok( !res, "RegSetValueExA returned %d\n", res ); + ok( !res, "RegSetValueExA returned %ld\n", res ); res = RegSetValueExA( test_key, "Test", 0, REG_EXPAND_SZ, NULL, 0 ); - ok( ERROR_SUCCESS == res, "RegSetValueExA returned %d\n", res ); + ok( ERROR_SUCCESS == res, "RegSetValueExA returned %ld\n", res ); res = RegSetValueExA( test_key, "Test", 0, REG_BINARY, NULL, 0 ); - ok( ERROR_SUCCESS == res, "RegSetValueExA returned %d\n", res ); + ok( ERROR_SUCCESS == res, "RegSetValueExA returned %ld\n", res ); /* test reading the value and data without setting them */ val_count = 20; @@ -502,10 +502,10 @@ static void test_enum_value(void) strcpy( value, "xxxxxxxxxx" ); strcpy( data, "xxxxxxxxxx" ); res = RegEnumValueA( test_key, 0, value, &val_count, NULL, &type, (LPBYTE)data, &data_count ); - ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res ); - ok( val_count == 4, "val_count set to %d instead of 4\n", val_count ); - ok( data_count == 0, "data_count set to %d instead of 0\n", data_count ); - ok( type == REG_BINARY, "type %d is not REG_BINARY\n", type ); + ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res ); + ok( val_count == 4, "val_count set to %ld instead of 4\n", val_count ); + ok( data_count == 0, "data_count set to %ld instead of 0\n", data_count ); + ok( type == REG_BINARY, "type %ld is not REG_BINARY\n", type ); ok( !strcmp( value, "Test" ), "value is '%s' instead of Test\n", value ); ok( !strcmp( data, "xxxxxxxxxx" ), "data is '%s' instead of xxxxxxxxxx\n", data ); @@ -515,15 +515,15 @@ static void test_enum_value(void) wcscpy( valueW, L"xxxxxxxx" ); wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, valueW, &val_count, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res ); - ok( val_count == 4, "val_count set to %d instead of 4\n", val_count ); - ok( data_count == 0, "data_count set to %d instead of 0\n", data_count ); - ok( type == REG_BINARY, "type %d is not REG_BINARY\n", type ); + ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res ); + ok( val_count == 4, "val_count set to %ld instead of 4\n", val_count ); + ok( data_count == 0, "data_count set to %ld instead of 0\n", data_count ); + ok( type == REG_BINARY, "type %ld is not REG_BINARY\n", type ); ok( !wcscmp( valueW, L"Test" ), "value is not 'Test'\n" ); ok( !wcscmp( dataW, L"xxxxxxxx" ), "data is not 'xxxxxxxx'\n" ); res = RegSetValueExA( test_key, "Test", 0, REG_SZ, (const BYTE *)"foobar", 7 ); - ok( res == 0, "RegSetValueExA failed error %d\n", res ); + ok( res == 0, "RegSetValueExA failed error %ld\n", res ); /* overflow both name and data */ val_count = 2; @@ -532,11 +532,11 @@ static void test_enum_value(void) strcpy( value, "xxxxxxxxxx" ); strcpy( data, "xxxxxxxxxx" ); res = RegEnumValueA( test_key, 0, value, &val_count, NULL, &type, (LPBYTE)data, &data_count ); - ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %d\n", res ); - ok( val_count == 2, "val_count set to %d\n", val_count ); + ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %ld\n", res ); + ok( val_count == 2, "val_count set to %ld\n", val_count ); /* Chinese, Japanese, and Korean editions of Windows 10 sometimes set data_count to a higher value */ - ok( data_count == 7 || broken( data_count > 7 ), "data_count set to %d instead of 7\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( data_count == 7 || broken( data_count > 7 ), "data_count set to %ld instead of 7\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !strcmp( value, "xxxxxxxxxx" ), "value set to '%s'\n", value ); ok( !strcmp( data, "xxxxxxxxxx" ), "data set to '%s'\n", data ); @@ -547,17 +547,17 @@ static void test_enum_value(void) strcpy( value, "xxxxxxxxxx" ); memset( data, 'x', sizeof(data) ); res = RegEnumValueA( test_key, 0, value, &val_count, NULL, &type, (LPBYTE)data, &data_count ); - ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %d\n", res ); - ok( val_count == 3, "val_count set to %d\n", val_count ); + ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %ld\n", res ); + ok( val_count == 3, "val_count set to %ld\n", val_count ); /* Chinese, Japanese, and Korean editions of Windows 10 sometimes set data_count to a higher value */ - ok( data_count == 7 || broken( data_count > 7 ), "data_count set to %d instead of 7\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( data_count == 7 || broken( data_count > 7 ), "data_count set to %ld instead of 7\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); /* v5.1.2600.0 (XP Home and Professional) does not touch value or data in this case */ ok( !strcmp( value, "Te" ) || !strcmp( value, "xxxxxxxxxx" ), "value set to '%s' instead of 'Te' or 'xxxxxxxxxx'\n", value ); ok( !strcmp( data, "foobar" ) || !strcmp( data, "xxxxxxx" ) || broken( data_count > 7 && strspn( data, "x" ) == data_count && data[data_count] == 0 ), - "data set to '%s' instead of 'foobar' or x's, data_count=%u\n", data, data_count ); + "data set to '%s' instead of 'foobar' or x's, data_count=%lu\n", data, data_count ); /* overflow empty name */ val_count = 0; @@ -566,16 +566,16 @@ static void test_enum_value(void) strcpy( value, "xxxxxxxxxx" ); memset( data, 'x', sizeof(data) ); res = RegEnumValueA( test_key, 0, value, &val_count, NULL, &type, (LPBYTE)data, &data_count ); - ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %d\n", res ); - ok( val_count == 0, "val_count set to %d\n", val_count ); + ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %ld\n", res ); + ok( val_count == 0, "val_count set to %ld\n", val_count ); /* Chinese, Japanese, and Korean editions of Windows 10 sometimes set data_count to a higher value */ - ok( data_count == 7 || broken( data_count > 7 ), "data_count set to %d instead of 7\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( data_count == 7 || broken( data_count > 7 ), "data_count set to %ld instead of 7\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !strcmp( value, "xxxxxxxxxx" ), "value set to '%s'\n", value ); /* v5.1.2600.0 (XP Home and Professional) does not touch data in this case */ ok( !strcmp( data, "foobar" ) || !strcmp( data, "xxxxxxx" ) || broken( data_count > 7 && strspn( data, "x" ) == data_count && data[data_count] == 0 ), - "data set to '%s' instead of 'foobar' or x's, data_count=%u\n", data, data_count ); + "data set to '%s' instead of 'foobar' or x's, data_count=%lu\n", data, data_count ); /* overflow data */ val_count = 20; @@ -584,10 +584,10 @@ static void test_enum_value(void) strcpy( value, "xxxxxxxxxx" ); strcpy( data, "xxxxxxxxxx" ); res = RegEnumValueA( test_key, 0, value, &val_count, NULL, &type, (LPBYTE)data, &data_count ); - ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %d\n", res ); - ok( val_count == 20, "val_count set to %d\n", val_count ); - ok( data_count == 7, "data_count set to %d instead of 7\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %ld\n", res ); + ok( val_count == 20, "val_count set to %ld\n", val_count ); + ok( data_count == 7, "data_count set to %ld instead of 7\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !strcmp( value, "xxxxxxxxxx" ), "value set to '%s'\n", value ); ok( !strcmp( data, "xxxxxxxxxx" ), "data set to '%s'\n", data ); @@ -598,10 +598,10 @@ static void test_enum_value(void) strcpy( value, "xxxxxxxxxx" ); strcpy( data, "xxxxxxxxxx" ); res = RegEnumValueA( test_key, 0, value, &val_count, NULL, &type, (LPBYTE)data, &data_count ); - ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res ); - ok( val_count == 4, "val_count set to %d instead of 4\n", val_count ); - ok( data_count == 7, "data_count set to %d instead of 7\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res ); + ok( val_count == 4, "val_count set to %ld instead of 4\n", val_count ); + ok( data_count == 7, "data_count set to %ld instead of 7\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !strcmp( value, "Test" ), "value is '%s' instead of Test\n", value ); ok( !strcmp( data, "foobar" ), "data is '%s' instead of foobar\n", data ); @@ -612,7 +612,7 @@ static void test_enum_value(void) type = 1234; strcpy( data, "xxxxxxxxxx" ); res = RegEnumValueA( test_key, 0, NULL, NULL, NULL, &type, (BYTE*)data, &data_count ); - ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", res ); + ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", res ); /* no value parameter */ val_count = 20; @@ -620,7 +620,7 @@ static void test_enum_value(void) type = 1234; strcpy( data, "xxxxxxxxxx" ); res = RegEnumValueA( test_key, 0, NULL, &val_count, NULL, &type, (BYTE*)data, &data_count ); - ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", res ); + ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", res ); /* no val_count parameter */ data_count = 20; @@ -628,7 +628,7 @@ static void test_enum_value(void) strcpy( value, "xxxxxxxxxx" ); strcpy( data, "xxxxxxxxxx" ); res = RegEnumValueA( test_key, 0, value, NULL, NULL, &type, (BYTE*)data, &data_count ); - ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", res ); + ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", res ); } /* Unicode tests */ @@ -640,7 +640,7 @@ static void test_enum_value(void) win_skip("RegSetValueExW is not implemented\n"); goto cleanup; } - ok( res == 0, "RegSetValueExW failed error %d\n", res ); + ok( res == 0, "RegSetValueExW failed error %ld\n", res ); /* overflow both name and data */ val_count = 2; @@ -649,10 +649,10 @@ static void test_enum_value(void) wcscpy( valueW, L"xxxxxxxx" ); wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, valueW, &val_count, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %d\n", res ); - ok( val_count == 2, "val_count set to %d\n", val_count ); - ok( data_count == 7*sizeof(WCHAR), "data_count set to %d instead of 7*sizeof(WCHAR)\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %ld\n", res ); + ok( val_count == 2, "val_count set to %ld\n", val_count ); + ok( data_count == 7*sizeof(WCHAR), "data_count set to %ld instead of 7*sizeof(WCHAR)\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !wcscmp( valueW, L"xxxxxxxx" ), "value modified\n" ); ok( !wcscmp( dataW, L"xxxxxxxx" ), "data modified\n" ); @@ -663,10 +663,10 @@ static void test_enum_value(void) wcscpy( valueW, L"xxxxxxxx" ); wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, valueW, &val_count, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %d\n", res ); - ok( val_count == 3, "val_count set to %d\n", val_count ); - ok( data_count == 7*sizeof(WCHAR), "data_count set to %d instead of 7*sizeof(WCHAR)\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %ld\n", res ); + ok( val_count == 3, "val_count set to %ld\n", val_count ); + ok( data_count == 7*sizeof(WCHAR), "data_count set to %ld instead of 7*sizeof(WCHAR)\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !wcscmp( valueW, L"xxxxxxxx" ), "value modified\n" ); ok( !wcscmp( dataW, L"xxxxxxxx" ), "data modified\n" ); @@ -677,10 +677,10 @@ static void test_enum_value(void) wcscpy( valueW, L"xxxxxxxx" ); wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, valueW, &val_count, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %d\n", res ); - ok( val_count == 4, "val_count set to %d instead of 4\n", val_count ); - ok( data_count == 7*sizeof(WCHAR), "data_count set to %d instead of 7*sizeof(WCHAR)\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( res == ERROR_MORE_DATA, "expected ERROR_MORE_DATA, got %ld\n", res ); + ok( val_count == 4, "val_count set to %ld instead of 4\n", val_count ); + ok( data_count == 7*sizeof(WCHAR), "data_count set to %ld instead of 7*sizeof(WCHAR)\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !wcscmp( valueW, L"Test" ), "value is not 'Test'\n" ); ok( !wcscmp( dataW, L"xxxxxxxx" ), "data modified\n" ); @@ -691,10 +691,10 @@ static void test_enum_value(void) wcscpy( valueW, L"xxxxxxxx" ); wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, valueW, &val_count, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res ); - ok( val_count == 4, "val_count set to %d instead of 4\n", val_count ); - ok( data_count == 7*sizeof(WCHAR), "data_count set to %d instead of 7*sizeof(WCHAR)\n", data_count ); - ok( type == REG_SZ, "type %d is not REG_SZ\n", type ); + ok( res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res ); + ok( val_count == 4, "val_count set to %ld instead of 4\n", val_count ); + ok( data_count == 7*sizeof(WCHAR), "data_count set to %ld instead of 7*sizeof(WCHAR)\n", data_count ); + ok( type == REG_SZ, "type %ld is not REG_SZ\n", type ); ok( !wcscmp( valueW, L"Test" ), "value is not 'Test'\n" ); ok( !wcscmp( dataW, L"foobar" ), "data is not 'foobar'\n" ); @@ -705,7 +705,7 @@ static void test_enum_value(void) type = 1234; wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, NULL, NULL, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", res ); + ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", res ); /* no valueW parameter */ val_count = 20; @@ -713,7 +713,7 @@ static void test_enum_value(void) type = 1234; wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, NULL, &val_count, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", res ); + ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", res ); /* no val_count parameter */ data_count = 20; @@ -721,7 +721,7 @@ static void test_enum_value(void) wcscpy( valueW, L"xxxxxxxx" ); wcscpy( dataW, L"xxxxxxxx" ); res = RegEnumValueW( test_key, 0, valueW, NULL, NULL, &type, (BYTE*)dataW, &data_count ); - ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", res ); + ok( res == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", res ); } cleanup: @@ -736,24 +736,24 @@ static void test_query_value_ex(void) size = sizeof(buffer); ret = RegQueryValueExA(hkey_main, "TP1_SZ", NULL, &type, NULL, &size); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); - ok(size == strlen(sTestpath1) + 1, "(%d,%d)\n", (DWORD)strlen(sTestpath1) + 1, size); - ok(type == REG_SZ, "type %d is not REG_SZ\n", type); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); + ok(size == strlen(sTestpath1) + 1, "(%ld,%ld)\n", (DWORD)strlen(sTestpath1) + 1, size); + ok(type == REG_SZ, "type %ld is not REG_SZ\n", type); type = 0xdeadbeef; size = 0xdeadbeef; ret = RegQueryValueExA(HKEY_CLASSES_ROOT, "Nonexistent Value", NULL, &type, NULL, &size); - ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n", ret); - ok(size == 0, "size should have been set to 0 instead of %d\n", size); + ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n", ret); + ok(size == 0, "size should have been set to 0 instead of %ld\n", size); size = sizeof(buffer); ret = RegQueryValueExA(HKEY_CLASSES_ROOT, "Nonexistent Value", NULL, &type, buffer, &size); - ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n", ret); - ok(size == sizeof(buffer), "size shouldn't have been changed to %d\n", size); + ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n", ret); + ok(size == sizeof(buffer), "size shouldn't have been changed to %ld\n", size); size = 4; ret = RegQueryValueExA(hkey_main, "BIN32", NULL, &size, buffer, &size); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); } static void test_get_value(void) @@ -774,133 +774,133 @@ static void test_get_value(void) /* Invalid parameter */ ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_DWORD, &type, &dw, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "ret=%d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "ret=%ld\n", ret); /* Query REG_DWORD using RRF_RT_REG_DWORD (ok) */ size = type = dw = 0xdeadbeef; ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_DWORD, &type, &dw, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); - ok(size == 4, "size=%d\n", size); - ok(type == REG_DWORD, "type=%d\n", type); - ok(dw == 0x12345678, "dw=%d\n", dw); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); + ok(size == 4, "size=%ld\n", size); + ok(type == REG_DWORD, "type=%ld\n", type); + ok(dw == 0x12345678, "dw=%ld\n", dw); /* Check RRF_SUBKEY_WOW64*KEY validation on a case without a subkey */ ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_DWORD | RRF_SUBKEY_WOW6464KEY | RRF_SUBKEY_WOW6432KEY, NULL, NULL, NULL); ok(ret == ERROR_INVALID_PARAMETER || broken(ret == ERROR_SUCCESS), /* Before Win10 */ - "ret=%d\n", ret); + "ret=%ld\n", ret); ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_DWORD | RRF_SUBKEY_WOW6464KEY, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_DWORD | RRF_SUBKEY_WOW6432KEY, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* Query by subkey-name */ ret = pRegGetValueA(HKEY_CURRENT_USER, "Software\\Wine\\Test", "DWORD", RRF_RT_REG_DWORD, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* Check RRF_SUBKEY_WOW64*KEY validation on a case with a subkey */ ret = pRegGetValueA(HKEY_CURRENT_USER, "Software\\Wine\\Test", "DWORD", RRF_RT_REG_DWORD | RRF_SUBKEY_WOW6464KEY | RRF_SUBKEY_WOW6432KEY, NULL, NULL, NULL); ok(ret == ERROR_INVALID_PARAMETER || broken(ret == ERROR_SUCCESS), /* Before Win10 */ - "ret=%d\n", ret); + "ret=%ld\n", ret); ret = pRegGetValueA(HKEY_CURRENT_USER, "Software\\Wine\\Test", "DWORD", RRF_RT_REG_DWORD | RRF_SUBKEY_WOW6464KEY, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); ret = pRegGetValueA(HKEY_CURRENT_USER, "Software\\Wine\\Test", "DWORD", RRF_RT_REG_DWORD | RRF_SUBKEY_WOW6432KEY, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* Query REG_DWORD using RRF_RT_REG_BINARY (restricted) */ size = type = dw = 0xdeadbeef; ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_BINARY, &type, &dw, &size); - ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%d\n", ret); + ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%ld\n", ret); /* Although the function failed all values are retrieved */ - ok(size == 4, "size=%d\n", size); - ok(type == REG_DWORD, "type=%d\n", type); - ok(dw == 0x12345678, "dw=%d\n", dw); + ok(size == 4, "size=%ld\n", size); + ok(type == REG_DWORD, "type=%ld\n", type); + ok(dw == 0x12345678, "dw=%ld\n", dw); /* Test RRF_ZEROONFAILURE */ type = dw = 0xdeadbeef; size = 4; ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_SZ|RRF_ZEROONFAILURE, &type, &dw, &size); - ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%d\n", ret); + ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%ld\n", ret); /* Again all values are retrieved ... */ - ok(size == 4, "size=%d\n", size); - ok(type == REG_DWORD, "type=%d\n", type); + ok(size == 4, "size=%ld\n", size); + ok(type == REG_DWORD, "type=%ld\n", type); /* ... except the buffer, which is zeroed out */ - ok(dw == 0, "dw=%d\n", dw); + ok(dw == 0, "dw=%ld\n", dw); /* Test RRF_ZEROONFAILURE with a NULL buffer... */ type = size = 0xbadbeef; ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_REG_SZ|RRF_ZEROONFAILURE, &type, NULL, &size); - ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%d\n", ret); - ok(size == 4, "size=%d\n", size); - ok(type == REG_DWORD, "type=%d\n", type); + ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%ld\n", ret); + ok(size == 4, "size=%ld\n", size); + ok(type == REG_DWORD, "type=%ld\n", type); /* Query REG_DWORD using RRF_RT_DWORD (ok) */ size = type = dw = 0xdeadbeef; ret = pRegGetValueA(hkey_main, NULL, "DWORD", RRF_RT_DWORD, &type, &dw, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); - ok(size == 4, "size=%d\n", size); - ok(type == REG_DWORD, "type=%d\n", type); - ok(dw == 0x12345678, "dw=%d\n", dw); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); + ok(size == 4, "size=%ld\n", size); + ok(type == REG_DWORD, "type=%ld\n", type); + ok(dw == 0x12345678, "dw=%ld\n", dw); /* Query 32-bit REG_BINARY using RRF_RT_DWORD (ok) */ size = type = dw = 0xdeadbeef; ret = pRegGetValueA(hkey_main, NULL, "BIN32", RRF_RT_DWORD, &type, &dw, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); - ok(size == 4, "size=%d\n", size); - ok(type == REG_BINARY, "type=%d\n", type); - ok(dw == 0x12345678, "dw=%d\n", dw); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); + ok(size == 4, "size=%ld\n", size); + ok(type == REG_BINARY, "type=%ld\n", type); + ok(dw == 0x12345678, "dw=%ld\n", dw); /* Query 64-bit REG_BINARY using RRF_RT_DWORD (type mismatch) */ qw[0] = qw[1] = size = type = 0xdeadbeef; ret = pRegGetValueA(hkey_main, NULL, "BIN64", RRF_RT_DWORD, &type, qw, &size); - ok(ret == ERROR_DATATYPE_MISMATCH, "ret=%d\n", ret); - ok(size == 8, "size=%d\n", size); - ok(type == REG_BINARY, "type=%d\n", type); + ok(ret == ERROR_DATATYPE_MISMATCH, "ret=%ld\n", ret); + ok(size == 8, "size=%ld\n", size); + ok(type == REG_BINARY, "type=%ld\n", type); ok(qw[0] == 0x12345678 && - qw[1] == 0x87654321, "qw={%d,%d}\n", qw[0], qw[1]); + qw[1] == 0x87654321, "qw={%ld,%ld}\n", qw[0], qw[1]); /* Query 64-bit REG_BINARY using 32-bit buffer (buffer too small) */ type = dw = 0xdeadbeef; size = 4; ret = pRegGetValueA(hkey_main, NULL, "BIN64", RRF_RT_REG_BINARY, &type, &dw, &size); - ok(ret == ERROR_MORE_DATA, "ret=%d\n", ret); - ok(dw == 0xdeadbeef, "dw=%d\n", dw); - ok(size == 8, "size=%d\n", size); + ok(ret == ERROR_MORE_DATA, "ret=%ld\n", ret); + ok(dw == 0xdeadbeef, "dw=%ld\n", dw); + ok(size == 8, "size=%ld\n", size); /* Query 64-bit REG_BINARY using RRF_RT_QWORD (ok) */ qw[0] = qw[1] = size = type = 0xdeadbeef; ret = pRegGetValueA(hkey_main, NULL, "BIN64", RRF_RT_QWORD, &type, qw, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); - ok(size == 8, "size=%d\n", size); - ok(type == REG_BINARY, "type=%d\n", type); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); + ok(size == 8, "size=%ld\n", size); + ok(type == REG_BINARY, "type=%ld\n", type); ok(qw[0] == 0x12345678 && - qw[1] == 0x87654321, "qw={%d,%d}\n", qw[0], qw[1]); + qw[1] == 0x87654321, "qw={%ld,%ld}\n", qw[0], qw[1]); /* Query REG_SZ using RRF_RT_REG_SZ (ok) */ buf[0] = 0; type = 0xdeadbeef; size = sizeof(buf); ret = pRegGetValueA(hkey_main, NULL, "TP1_SZ", RRF_RT_REG_SZ, &type, buf, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); - ok(size == strlen(sTestpath1)+1, "strlen(sTestpath1)=%d size=%d\n", lstrlenA(sTestpath1), size); - ok(type == REG_SZ, "type=%d\n", type); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); + ok(size == strlen(sTestpath1)+1, "strlen(sTestpath1)=%d size=%ld\n", lstrlenA(sTestpath1), size); + ok(type == REG_SZ, "type=%ld\n", type); ok(!strcmp(sTestpath1, buf), "sTestpath=\"%s\" buf=\"%s\"\n", sTestpath1, buf); /* Query REG_SZ using RRF_RT_REG_SZ and no buffer (ok) */ type = 0xdeadbeef; size = 0; ret = pRegGetValueA(hkey_main, NULL, "TP1_SZ", RRF_RT_REG_SZ, &type, NULL, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* v5.2.3790.1830 (2003 SP1) returns sTestpath1 length + 2 here. */ ok(size == strlen(sTestpath1)+1 || broken(size == strlen(sTestpath1)+2), - "strlen(sTestpath1)=%d size=%d\n", lstrlenA(sTestpath1), size); - ok(type == REG_SZ, "type=%d\n", type); + "strlen(sTestpath1)=%d size=%ld\n", lstrlenA(sTestpath1), size); + ok(type == REG_SZ, "type=%ld\n", type); /* Query REG_SZ using RRF_RT_REG_SZ on a zero-byte value (ok) */ strcpy(buf, sTestpath1); type = 0xdeadbeef; size = sizeof(buf); ret = pRegGetValueA(hkey_main, NULL, "TP1_ZB_SZ", RRF_RT_REG_SZ, &type, buf, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* v5.2.3790.1830 (2003 SP1) returns sTestpath1 length + 2 here. */ ok(size == 0 || size == 1, /* win2k3 */ - "size=%d\n", size); - ok(type == REG_SZ, "type=%d\n", type); + "size=%ld\n", size); + ok(type == REG_SZ, "type=%ld\n", type); ok(!strcmp(sTestpath1, buf) || !strcmp(buf, ""), "Expected \"%s\" or \"\", got \"%s\"\n", sTestpath1, buf); @@ -908,73 +908,73 @@ static void test_get_value(void) /* Query REG_SZ using RRF_RT_REG_SZ|RRF_NOEXPAND (ok) */ buf[0] = 0; type = 0xdeadbeef; size = sizeof(buf); ret = pRegGetValueA(hkey_main, NULL, "TP1_SZ", RRF_RT_REG_SZ|RRF_NOEXPAND, &type, buf, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); - ok(size == strlen(sTestpath1)+1, "strlen(sTestpath1)=%d size=%d\n", lstrlenA(sTestpath1), size); - ok(type == REG_SZ, "type=%d\n", type); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); + ok(size == strlen(sTestpath1)+1, "strlen(sTestpath1)=%d size=%ld\n", lstrlenA(sTestpath1), size); + ok(type == REG_SZ, "type=%ld\n", type); ok(!strcmp(sTestpath1, buf), "sTestpath=\"%s\" buf=\"%s\"\n", sTestpath1, buf); /* Query REG_EXPAND_SZ using RRF_RT_REG_SZ and no buffer (ok, expands) */ size = 0; ret = pRegGetValueA(hkey_main, NULL, "TP2_EXP_SZ", RRF_RT_REG_SZ, NULL, NULL, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); ok((size == strlen(expanded2)+1) || /* win2k3 SP1 */ (size == strlen(expanded2)+2) || /* win2k3 SP2 */ (size == strlen(sTestpath2)+1), - "strlen(expanded2)=%d, strlen(sTestpath2)=%d, size=%d\n", lstrlenA(expanded2), lstrlenA(sTestpath2), size); + "strlen(expanded2)=%d, strlen(sTestpath2)=%d, size=%ld\n", lstrlenA(expanded2), lstrlenA(sTestpath2), size); /* Query REG_EXPAND_SZ using RRF_RT_REG_SZ (ok, expands) */ buf[0] = 0; type = 0xdeadbeef; size = sizeof(buf); ret = pRegGetValueA(hkey_main, NULL, "TP1_EXP_SZ", RRF_RT_REG_SZ, &type, buf, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* At least v5.2.3790.1830 (2003 SP1) returns the unexpanded sTestpath1 length + 1 here. */ ok(size == strlen(expanded)+1 || broken(size == strlen(sTestpath1)+1), - "strlen(expanded)=%d, strlen(sTestpath1)=%d, size=%d\n", lstrlenA(expanded), lstrlenA(sTestpath1), size); - ok(type == REG_SZ, "type=%d\n", type); + "strlen(expanded)=%d, strlen(sTestpath1)=%d, size=%ld\n", lstrlenA(expanded), lstrlenA(sTestpath1), size); + ok(type == REG_SZ, "type=%ld\n", type); ok(!strcmp(expanded, buf), "expanded=\"%s\" buf=\"%s\"\n", expanded, buf); /* Query REG_EXPAND_SZ using RRF_RT_REG_SZ (ok, expands a lot) */ buf[0] = 0; type = 0xdeadbeef; size = sizeof(buf); ret = pRegGetValueA(hkey_main, NULL, "TP2_EXP_SZ", RRF_RT_REG_SZ, &type, buf, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* At least v5.2.3790.1830 (2003 SP1) returns the unexpanded sTestpath2 length + 1 here. */ ok(size == strlen(expanded2)+1 || broken(size == strlen(sTestpath2)+1), - "strlen(expanded2)=%d, strlen(sTestpath1)=%d, size=%d\n", lstrlenA(expanded2), lstrlenA(sTestpath2), size); - ok(type == REG_SZ, "type=%d\n", type); + "strlen(expanded2)=%d, strlen(sTestpath1)=%d, size=%ld\n", lstrlenA(expanded2), lstrlenA(sTestpath2), size); + ok(type == REG_SZ, "type=%ld\n", type); ok(!strcmp(expanded2, buf), "expanded2=\"%s\" buf=\"%s\"\n", expanded2, buf); /* Query REG_EXPAND_SZ using RRF_RT_REG_EXPAND_SZ|RRF_NOEXPAND (ok, doesn't expand) */ buf[0] = 0; type = 0xdeadbeef; size = sizeof(buf); ret = pRegGetValueA(hkey_main, NULL, "TP1_EXP_SZ", RRF_RT_REG_EXPAND_SZ|RRF_NOEXPAND, &type, buf, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); - ok(size == strlen(sTestpath1)+1, "strlen(sTestpath1)=%d size=%d\n", lstrlenA(sTestpath1), size); - ok(type == REG_EXPAND_SZ, "type=%d\n", type); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); + ok(size == strlen(sTestpath1)+1, "strlen(sTestpath1)=%d size=%ld\n", lstrlenA(sTestpath1), size); + ok(type == REG_EXPAND_SZ, "type=%ld\n", type); ok(!strcmp(sTestpath1, buf), "sTestpath=\"%s\" buf=\"%s\"\n", sTestpath1, buf); /* Query REG_EXPAND_SZ using RRF_RT_REG_EXPAND_SZ|RRF_NOEXPAND and no buffer (ok, doesn't expand) */ size = 0xbadbeef; ret = pRegGetValueA(hkey_main, NULL, "TP1_EXP_SZ", RRF_RT_REG_EXPAND_SZ|RRF_NOEXPAND, NULL, NULL, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* v5.2.3790.1830 (2003 SP1) returns sTestpath1 length + 2 here. */ ok(size == strlen(sTestpath1)+1 || broken(size == strlen(sTestpath1)+2), - "strlen(sTestpath1)=%d size=%d\n", lstrlenA(sTestpath1), size); + "strlen(sTestpath1)=%d size=%ld\n", lstrlenA(sTestpath1), size); /* Query REG_EXPAND_SZ using RRF_RT_REG_SZ|RRF_NOEXPAND (type mismatch) */ ret = pRegGetValueA(hkey_main, NULL, "TP1_EXP_SZ", RRF_RT_REG_SZ|RRF_NOEXPAND, NULL, NULL, NULL); - ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%d\n", ret); + ok(ret == ERROR_UNSUPPORTED_TYPE, "ret=%ld\n", ret); /* Query REG_EXPAND_SZ using RRF_RT_REG_EXPAND_SZ (not allowed without RRF_NOEXPAND) */ ret = pRegGetValueA(hkey_main, NULL, "TP1_EXP_SZ", RRF_RT_REG_EXPAND_SZ, NULL, NULL, NULL); /* before win8: ERROR_INVALID_PARAMETER, win8: ERROR_UNSUPPORTED_TYPE */ - ok(ret == ERROR_INVALID_PARAMETER || ret == ERROR_UNSUPPORTED_TYPE, "ret=%d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER || ret == ERROR_UNSUPPORTED_TYPE, "ret=%ld\n", ret); /* Query REG_EXPAND_SZ using RRF_RT_ANY */ buf[0] = 0; type = 0xdeadbeef; size = sizeof(buf); ret = pRegGetValueA(hkey_main, NULL, "TP1_EXP_SZ", RRF_RT_ANY, &type, buf, &size); - ok(ret == ERROR_SUCCESS, "ret=%d\n", ret); + ok(ret == ERROR_SUCCESS, "ret=%ld\n", ret); /* At least v5.2.3790.1830 (2003 SP1) returns the unexpanded sTestpath1 length + 1 here. */ ok(size == strlen(expanded)+1 || broken(size == strlen(sTestpath1)+1), - "strlen(expanded)=%d, strlen(sTestpath1)=%d, size=%d\n", lstrlenA(expanded), lstrlenA(sTestpath1), size); - ok(type == REG_SZ, "type=%d\n", type); + "strlen(expanded)=%d, strlen(sTestpath1)=%d, size=%ld\n", lstrlenA(expanded), lstrlenA(sTestpath1), size); + ok(type == REG_SZ, "type=%ld\n", type); ok(!strcmp(expanded, buf), "expanded=\"%s\" buf=\"%s\"\n", expanded, buf); } @@ -994,20 +994,20 @@ static void test_reg_open_key(void) /* successful open */ ret = RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Test", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != NULL, "expected hkResult != NULL\n"); hkPreserve = hkResult; /* open same key twice */ ret = RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Test", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != hkPreserve, "expected hkResult != hkPreserve\n"); ok(hkResult != NULL, "hkResult != NULL\n"); RegCloseKey(hkResult); /* trailing slashes */ ret = RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Test\\\\", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); RegCloseKey(hkResult); /* open nonexistent key @@ -1015,13 +1015,13 @@ static void test_reg_open_key(void) */ hkResult = hkPreserve; ret = RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Nonexistent", &hkResult); - ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n", ret); ok(hkResult == NULL, "expected hkResult == NULL\n"); /* open the same nonexistent key again to make sure the key wasn't created */ hkResult = hkPreserve; ret = RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Nonexistent", &hkResult); - ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n", ret); ok(hkResult == NULL, "expected hkResult == NULL\n"); /* send in NULL lpSubKey @@ -1029,13 +1029,13 @@ static void test_reg_open_key(void) */ hkResult = hkPreserve; ret = RegOpenKeyA(HKEY_CURRENT_USER, NULL, &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult == HKEY_CURRENT_USER, "expected hkResult == HKEY_CURRENT_USER\n"); /* send empty-string in lpSubKey */ hkResult = hkPreserve; ret = RegOpenKeyA(HKEY_CURRENT_USER, "", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult == HKEY_CURRENT_USER, "expected hkResult == HKEY_CURRENT_USER\n"); /* send in NULL lpSubKey and NULL hKey @@ -1043,7 +1043,7 @@ static void test_reg_open_key(void) */ hkResult = hkPreserve; ret = RegOpenKeyA(NULL, NULL, &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult == NULL, "expected hkResult == NULL\n"); /* only send NULL hKey @@ -1052,73 +1052,73 @@ static void test_reg_open_key(void) hkResult = hkPreserve; ret = RegOpenKeyA(NULL, "Software\\Wine\\Test", &hkResult); ok(ret == ERROR_INVALID_HANDLE || ret == ERROR_BADKEY, /* Windows 95 returns BADKEY */ - "expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %d\n", ret); + "expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %ld\n", ret); ok(hkResult == hkPreserve, "expected hkResult == hkPreserve\n"); /* send in NULL hkResult */ ret = RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Test", NULL); - ok(ret == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", ret); ret = RegOpenKeyA(HKEY_CURRENT_USER, NULL, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", ret); ret = RegOpenKeyA(NULL, NULL, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", ret); /* beginning backslash character */ ret = RegOpenKeyA(HKEY_CURRENT_USER, "\\Software\\Wine\\Test", &hkResult); ok(ret == ERROR_BAD_PATHNAME || /* NT/2k/XP */ broken(ret == ERROR_SUCCESS), /* wow64 */ - "expected ERROR_BAD_PATHNAME or ERROR_FILE_NOT_FOUND, got %d\n", ret); + "expected ERROR_BAD_PATHNAME or ERROR_FILE_NOT_FOUND, got %ld\n", ret); if (!ret) RegCloseKey(hkResult); hkResult = NULL; ret = RegOpenKeyExA(HKEY_CLASSES_ROOT, "\\clsid", 0, KEY_QUERY_VALUE, &hkResult); ok(ret == ERROR_SUCCESS || /* 2k/XP */ ret == ERROR_BAD_PATHNAME, /* NT */ - "expected ERROR_SUCCESS, ERROR_BAD_PATHNAME or ERROR_FILE_NOT_FOUND, got %d\n", ret); + "expected ERROR_SUCCESS, ERROR_BAD_PATHNAME or ERROR_FILE_NOT_FOUND, got %ld\n", ret); RegCloseKey(hkResult); /* NULL or empty subkey of special root */ hkResult = NULL; ret = RegOpenKeyExA(HKEY_CLASSES_ROOT, NULL, 0, KEY_QUERY_VALUE, &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult == HKEY_CLASSES_ROOT, "expected hkResult == HKEY_CLASSES_ROOT\n"); hkResult = NULL; ret = RegOpenKeyExA(HKEY_CLASSES_ROOT, "", 0, KEY_QUERY_VALUE, &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult == HKEY_CLASSES_ROOT, "expected hkResult == HKEY_CLASSES_ROOT\n"); hkResult = NULL; ret = RegOpenKeyExA(HKEY_CLASSES_ROOT, "\\", 0, KEY_QUERY_VALUE, &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != HKEY_CLASSES_ROOT, "expected hkResult to be a new key\n"); ok(!RegCloseKey(hkResult), "got invalid hkey\n"); /* empty subkey of existing handle */ hkResult = hkPreserve; ret = RegOpenKeyExA(hkPreserve, "", 0, KEY_QUERY_VALUE, &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != hkPreserve, "expected hkResult != hkPreserve\n"); ok(!RegCloseKey(hkResult), "got invalid hkey\n"); /* NULL subkey of existing handle */ hkResult = hkPreserve; ret = RegOpenKeyExA(hkPreserve, NULL, 0, KEY_QUERY_VALUE, &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != hkPreserve, "expected hkResult != hkPreserve\n"); ok(!RegCloseKey(hkResult), "got invalid hkey\n"); /* empty subkey of NULL */ hkResult = hkPreserve; ret = RegOpenKeyExW(NULL, L"", 0, KEY_QUERY_VALUE, &hkResult); - ok(ret == ERROR_INVALID_HANDLE, "expected ERROR_INVALID_HANDLE, got %d\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "expected ERROR_INVALID_HANDLE, got %ld\n", ret); ok(hkResult == NULL || broken(hkResult == hkPreserve /* Windows XP */), "expected hkResult == NULL\n"); hkResult = hkPreserve; ret = RegOpenKeyExA(NULL, "", 0, KEY_QUERY_VALUE, &hkResult); - ok(ret == ERROR_INVALID_HANDLE, "expected ERROR_INVALID_HANDLE, got %d\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "expected ERROR_INVALID_HANDLE, got %ld\n", ret); ok(hkResult == hkPreserve, "expected hkResult == hkPreserve\n"); RegCloseKey(hkPreserve); @@ -1127,13 +1127,13 @@ static void test_reg_open_key(void) hkResult = NULL; ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software", 0, KEY_READ|KEY_WOW64_32KEY, &hkResult); ok((ret == ERROR_SUCCESS && hkResult != NULL) || broken(ret == ERROR_ACCESS_DENIED /* NT4, win2k */), - "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%lu)\n", ret); RegCloseKey(hkResult); hkResult = NULL; ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software", 0, KEY_READ|KEY_WOW64_64KEY, &hkResult); ok((ret == ERROR_SUCCESS && hkResult != NULL) || broken(ret == ERROR_ACCESS_DENIED /* NT4, win2k */), - "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%lu)\n", ret); RegCloseKey(hkResult); /* check special HKEYs on 64bit @@ -1143,28 +1143,28 @@ static void test_reg_open_key(void) { /* HKEY_CURRENT_USER */ ret = RegOpenKeyA(UlongToHandle(HandleToUlong(HKEY_CURRENT_USER)), "Software", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != NULL, "expected hkResult != NULL\n"); RegCloseKey(hkResult); ret = RegOpenKeyA((HKEY)(HandleToUlong(HKEY_CURRENT_USER) | (ULONG64)1 << 32), "Software", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != NULL, "expected hkResult != NULL\n"); RegCloseKey(hkResult); ret = RegOpenKeyA((HKEY)(HandleToUlong(HKEY_CURRENT_USER) | (ULONG64)0xdeadbeef << 32), "Software", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != NULL, "expected hkResult != NULL\n"); RegCloseKey(hkResult); ret = RegOpenKeyA((HKEY)(HandleToUlong(HKEY_CURRENT_USER) | (ULONG64)0xffffffff << 32), "Software", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != NULL, "expected hkResult != NULL\n"); RegCloseKey(hkResult); /* HKEY_LOCAL_MACHINE */ ret = RegOpenKeyA((HKEY)(HandleToUlong(HKEY_LOCAL_MACHINE) | (ULONG64)0xdeadbeef << 32), "Software", &hkResult); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ok(hkResult != NULL, "expected hkResult != NULL\n"); RegCloseKey(hkResult); } @@ -1183,24 +1183,24 @@ static void test_reg_open_key(void) KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &hkRoot32, NULL); if (limited_user) ok(ret == ERROR_ACCESS_DENIED && hkRoot32 == NULL, - "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%u)\n", ret); + "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%lu)\n", ret); else ok(ret == ERROR_SUCCESS && hkRoot32 != NULL, - "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%u)\n", ret); + "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%lu)\n", ret); ret = RegCreateKeyExA(HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &hkRoot64, NULL); if (limited_user) ok(ret == ERROR_ACCESS_DENIED && hkRoot64 == NULL, - "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%u)\n", ret); + "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%lu)\n", ret); else ok(ret == ERROR_SUCCESS && hkRoot64 != NULL, - "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%u)\n", ret); + "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%lu)\n", ret); bRet = AllocateAndInitializeSid(&sid_authority, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &world_sid); ok(bRet == TRUE, - "Expected AllocateAndInitializeSid to return TRUE, got %d, last error %u\n", bRet, GetLastError()); + "Expected AllocateAndInitializeSid to return TRUE, got %d, last error %lu\n", bRet, GetLastError()); access.grfAccessPermissions = GENERIC_ALL | STANDARD_RIGHTS_ALL; access.grfAccessMode = SET_ACCESS; @@ -1213,16 +1213,16 @@ static void test_reg_open_key(void) ret = SetEntriesInAclA(1, &access, NULL, &key_acl); ok(ret == ERROR_SUCCESS, - "Expected SetEntriesInAclA to return ERROR_SUCCESS, got %u, last error %u\n", ret, GetLastError()); + "Expected SetEntriesInAclA to return ERROR_SUCCESS, got %lu, last error %lu\n", ret, GetLastError()); sd = HeapAlloc(GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH); bRet = InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION); ok(bRet == TRUE, - "Expected InitializeSecurityDescriptor to return TRUE, got %d, last error %u\n", bRet, GetLastError()); + "Expected InitializeSecurityDescriptor to return TRUE, got %d, last error %lu\n", bRet, GetLastError()); bRet = SetSecurityDescriptorDacl(sd, TRUE, key_acl, FALSE); ok(bRet == TRUE, - "Expected SetSecurityDescriptorDacl to return TRUE, got %d, last error %u\n", bRet, GetLastError()); + "Expected SetSecurityDescriptorDacl to return TRUE, got %d, last error %lu\n", bRet, GetLastError()); if (limited_user) { @@ -1234,22 +1234,22 @@ static void test_reg_open_key(void) error = RegSetKeySecurity(hkRoot64, DACL_SECURITY_INFORMATION, sd); ok(error == ERROR_SUCCESS, - "Expected RegSetKeySecurity to return success, got error %u\n", error); + "Expected RegSetKeySecurity to return success, got error %lu\n", error); error = RegSetKeySecurity(hkRoot32, DACL_SECURITY_INFORMATION, sd); ok(error == ERROR_SUCCESS, - "Expected RegSetKeySecurity to return success, got error %u\n", error); + "Expected RegSetKeySecurity to return success, got error %lu\n", error); hkResult = NULL; ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software\\Wine", 0, KEY_WOW64_64KEY | KEY_READ, &hkResult); ok(ret == ERROR_SUCCESS && hkResult != NULL, - "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%lu)\n", ret); RegCloseKey(hkResult); hkResult = NULL; ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software\\Wine", 0, KEY_WOW64_32KEY | KEY_READ, &hkResult); ok(ret == ERROR_SUCCESS && hkResult != NULL, - "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%lu)\n", ret); RegCloseKey(hkResult); } @@ -1277,11 +1277,11 @@ static void test_reg_create_key(void) SECURITY_DESCRIPTOR *sd; ret = RegCreateKeyExA(hkey_main, "Subkey1", 0, NULL, 0, KEY_NOTIFY, NULL, &hkey1, NULL); - ok(!ret, "RegCreateKeyExA failed with error %d\n", ret); + ok(!ret, "RegCreateKeyExA failed with error %ld\n", ret); /* should succeed: all versions of Windows ignore the access rights * to the parent handle */ ret = RegCreateKeyExA(hkey1, "Subkey2", 0, NULL, 0, KEY_SET_VALUE, NULL, &hkey2, NULL); - ok(!ret, "RegCreateKeyExA failed with error %d\n", ret); + ok(!ret, "RegCreateKeyExA failed with error %ld\n", ret); /* clean up */ RegDeleteKeyA(hkey2, ""); @@ -1291,16 +1291,16 @@ static void test_reg_create_key(void) /* test creation of volatile keys */ ret = RegCreateKeyExA(hkey_main, "Volatile", 0, NULL, REG_OPTION_VOLATILE, KEY_ALL_ACCESS, NULL, &hkey1, NULL); - ok(!ret, "RegCreateKeyExA failed with error %d\n", ret); + ok(!ret, "RegCreateKeyExA failed with error %ld\n", ret); ret = RegCreateKeyExA(hkey1, "Subkey2", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &hkey2, NULL); - ok(ret == ERROR_CHILD_MUST_BE_VOLATILE, "RegCreateKeyExA failed with error %d\n", ret); + ok(ret == ERROR_CHILD_MUST_BE_VOLATILE, "RegCreateKeyExA failed with error %ld\n", ret); if (!ret) RegCloseKey( hkey2 ); ret = RegCreateKeyExA(hkey1, "Subkey2", 0, NULL, REG_OPTION_VOLATILE, KEY_ALL_ACCESS, NULL, &hkey2, NULL); - ok(!ret, "RegCreateKeyExA failed with error %d\n", ret); + ok(!ret, "RegCreateKeyExA failed with error %ld\n", ret); RegCloseKey(hkey2); /* should succeed if the key already exists */ ret = RegCreateKeyExA(hkey1, "Subkey2", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &hkey2, NULL); - ok(!ret, "RegCreateKeyExA failed with error %d\n", ret); + ok(!ret, "RegCreateKeyExA failed with error %ld\n", ret); /* clean up */ RegDeleteKeyA(hkey2, ""); @@ -1311,16 +1311,16 @@ static void test_reg_create_key(void) /* beginning backslash character */ ret = RegCreateKeyExA(hkey_main, "\\Subkey3", 0, NULL, 0, KEY_NOTIFY, NULL, &hkey1, NULL); if (!(GetVersion() & 0x80000000)) - ok(ret == ERROR_BAD_PATHNAME, "expected ERROR_BAD_PATHNAME, got %d\n", ret); + ok(ret == ERROR_BAD_PATHNAME, "expected ERROR_BAD_PATHNAME, got %ld\n", ret); else { - ok(!ret, "RegCreateKeyExA failed with error %d\n", ret); + ok(!ret, "RegCreateKeyExA failed with error %ld\n", ret); RegDeleteKeyA(hkey1, ""); RegCloseKey(hkey1); } /* trailing backslash characters */ ret = RegCreateKeyExA(hkey_main, "Subkey4\\\\", 0, NULL, 0, KEY_NOTIFY, NULL, &hkey1, NULL); - ok(ret == ERROR_SUCCESS, "RegCreateKeyExA failed with error %d\n", ret); + ok(ret == ERROR_SUCCESS, "RegCreateKeyExA failed with error %ld\n", ret); RegDeleteKeyA(hkey1, ""); RegCloseKey(hkey1); @@ -1328,13 +1328,13 @@ static void test_reg_create_key(void) hkey1 = NULL; ret = RegCreateKeyExA(HKEY_LOCAL_MACHINE, "Software", 0, NULL, 0, KEY_READ|KEY_WOW64_32KEY, NULL, &hkey1, NULL); ok((ret == ERROR_SUCCESS && hkey1 != NULL) || broken(ret == ERROR_ACCESS_DENIED /* NT4, win2k */), - "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%lu)\n", ret); RegCloseKey(hkey1); hkey1 = NULL; ret = RegCreateKeyExA(HKEY_LOCAL_MACHINE, "Software", 0, NULL, 0, KEY_READ|KEY_WOW64_64KEY, NULL, &hkey1, NULL); ok((ret == ERROR_SUCCESS && hkey1 != NULL) || broken(ret == ERROR_ACCESS_DENIED /* NT4, win2k */), - "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%lu)\n", ret); RegCloseKey(hkey1); /* Try using WOW64 flags when opening a key with a DACL set to verify that @@ -1351,24 +1351,24 @@ static void test_reg_create_key(void) KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &hkRoot32, NULL); if (limited_user) ok(ret == ERROR_ACCESS_DENIED && hkRoot32 == NULL, - "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%d)\n", ret); + "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%ld)\n", ret); else ok(ret == ERROR_SUCCESS && hkRoot32 != NULL, - "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%d)\n", ret); + "RegCreateKeyEx with KEY_WOW64_32KEY failed (err=%ld)\n", ret); ret = RegCreateKeyExA(HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &hkRoot64, NULL); if (limited_user) ok(ret == ERROR_ACCESS_DENIED && hkRoot64 == NULL, - "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%d)\n", ret); + "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%ld)\n", ret); else ok(ret == ERROR_SUCCESS && hkRoot64 != NULL, - "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%d)\n", ret); + "RegCreateKeyEx with KEY_WOW64_64KEY failed (err=%ld)\n", ret); bRet = AllocateAndInitializeSid(&sid_authority, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &world_sid); ok(bRet == TRUE, - "Expected AllocateAndInitializeSid to return TRUE, got %d, last error %u\n", bRet, GetLastError()); + "Expected AllocateAndInitializeSid to return TRUE, got %d, last error %lu\n", bRet, GetLastError()); access.grfAccessPermissions = GENERIC_ALL | STANDARD_RIGHTS_ALL; access.grfAccessMode = SET_ACCESS; @@ -1381,16 +1381,16 @@ static void test_reg_create_key(void) dwRet = SetEntriesInAclA(1, &access, NULL, &key_acl); ok(dwRet == ERROR_SUCCESS, - "Expected SetEntriesInAclA to return ERROR_SUCCESS, got %u, last error %u\n", dwRet, GetLastError()); + "Expected SetEntriesInAclA to return ERROR_SUCCESS, got %lu, last error %lu\n", dwRet, GetLastError()); sd = HeapAlloc(GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH); bRet = InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION); ok(bRet == TRUE, - "Expected InitializeSecurityDescriptor to return TRUE, got %d, last error %u\n", bRet, GetLastError()); + "Expected InitializeSecurityDescriptor to return TRUE, got %d, last error %lu\n", bRet, GetLastError()); bRet = SetSecurityDescriptorDacl(sd, TRUE, key_acl, FALSE); ok(bRet == TRUE, - "Expected SetSecurityDescriptorDacl to return TRUE, got %d, last error %u\n", bRet, GetLastError()); + "Expected SetSecurityDescriptorDacl to return TRUE, got %d, last error %lu\n", bRet, GetLastError()); if (limited_user) { @@ -1400,24 +1400,24 @@ static void test_reg_create_key(void) { ret = RegSetKeySecurity(hkRoot64, DACL_SECURITY_INFORMATION, sd); ok(ret == ERROR_SUCCESS, - "Expected RegSetKeySecurity to return success, got error %u\n", ret); + "Expected RegSetKeySecurity to return success, got error %lu\n", ret); ret = RegSetKeySecurity(hkRoot32, DACL_SECURITY_INFORMATION, sd); ok(ret == ERROR_SUCCESS, - "Expected RegSetKeySecurity to return success, got error %u\n", ret); + "Expected RegSetKeySecurity to return success, got error %lu\n", ret); hkey1 = NULL; ret = RegCreateKeyExA(HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_64KEY | KEY_READ, NULL, &hkey1, NULL); ok(ret == ERROR_SUCCESS && hkey1 != NULL, - "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_64KEY failed (err=%lu)\n", ret); RegCloseKey(hkey1); hkey1 = NULL; ret = RegCreateKeyExA(HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_32KEY | KEY_READ, NULL, &hkey1, NULL); ok(ret == ERROR_SUCCESS && hkey1 != NULL, - "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%u)\n", ret); + "RegOpenKeyEx with KEY_WOW64_32KEY failed (err=%lu)\n", ret); RegCloseKey(hkey1); } @@ -1439,19 +1439,19 @@ static void test_reg_close_key(void) * hkHandle remains changed after call to RegCloseKey */ ret = RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Test", &hkHandle); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(hkHandle); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); /* try to close the key twice */ ret = RegCloseKey(hkHandle); /* Windows 95 doesn't mind. */ ok(ret == ERROR_INVALID_HANDLE || ret == ERROR_SUCCESS, - "expected ERROR_INVALID_HANDLE or ERROR_SUCCESS, got %d\n", ret); + "expected ERROR_INVALID_HANDLE or ERROR_SUCCESS, got %ld\n", ret); /* try to close a NULL handle */ ret = RegCloseKey(NULL); ok(ret == ERROR_INVALID_HANDLE || ret == ERROR_BADKEY, /* Windows 95 returns BADKEY */ - "expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %d\n", ret); + "expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %ld\n", ret); /* Check to see if we didn't potentially close our main handle, which could happen on win98 as * win98 doesn't give a new handle when the same key is opened. @@ -1485,15 +1485,15 @@ static void test_reg_delete_key(void) ok(ret == ERROR_INVALID_PARAMETER || ret == ERROR_ACCESS_DENIED || ret == ERROR_BADKEY, /* Win95 */ - "ret=%d\n", ret); + "ret=%ld\n", ret); ret = RegCreateKeyA(hkey_main, "deleteme", &key); - ok(ret == ERROR_SUCCESS, "Could not create key, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Could not create key, got %ld\n", ret); ret = RegDeleteKeyA(key, ""); - ok(ret == ERROR_SUCCESS, "RegDeleteKeyA failed, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "RegDeleteKeyA failed, got %ld\n", ret); RegCloseKey(key); ret = RegOpenKeyA(hkey_main, "deleteme", &key); - ok(ret == ERROR_FILE_NOT_FOUND, "Key was not deleted, got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "Key was not deleted, got %ld\n", ret); RegCloseKey(key); } @@ -1543,7 +1543,7 @@ static void test_reg_save_key(void) } ret = RegSaveKeyA(hkey_main, "saved_key", NULL); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); set_privileges(SE_BACKUP_NAME, FALSE); } @@ -1561,12 +1561,12 @@ static void test_reg_load_key(void) } ret = RegLoadKeyA(HKEY_LOCAL_MACHINE, "Test", "saved_key"); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); set_privileges(SE_RESTORE_NAME, FALSE); ret = RegOpenKeyA(HKEY_LOCAL_MACHINE, "Test", &hkHandle); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); RegCloseKey(hkHandle); } @@ -1587,18 +1587,18 @@ static void test_reg_unload_key(void) } ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Test", 0, KEY_READ, &key); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); /* try to unload though the key handle is live */ pRtlInitUnicodeString(&key_name, L"\\REGISTRY\\Machine\\Test"); InitializeObjectAttributes(&attr, &key_name, OBJ_CASE_INSENSITIVE, NULL, NULL); status = pNtUnloadKey(&attr); - ok(status == STATUS_CANNOT_DELETE, "expected STATUS_CANNOT_DELETE, got %08x\n", status); + ok(status == STATUS_CANNOT_DELETE, "expected STATUS_CANNOT_DELETE, got %08lx\n", status); RegCloseKey(key); ret = RegUnLoadKeyA(HKEY_LOCAL_MACHINE, "Test"); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); set_privileges(SE_RESTORE_NAME, FALSE); @@ -1621,7 +1621,7 @@ static void test_regconnectregistry( void) SetLastError(0xdeadbeef); ret = GetComputerNameA(compName, &len); - ok( ret, "GetComputerName failed err = %d\n", GetLastError()); + ok( ret, "GetComputerName failed err = %ld\n", GetLastError()); if( !ret) return; lstrcpyA(netwName, "\\\\"); @@ -1631,14 +1631,14 @@ static void test_regconnectregistry( void) ok( !retl || retl == ERROR_DLL_INIT_FAILED || retl == ERROR_BAD_NETPATH, /* some win2k */ - "RegConnectRegistryA failed err = %d\n", retl); + "RegConnectRegistryA failed err = %ld\n", retl); if( !retl) RegCloseKey( hkey); retl = RegConnectRegistryA( netwName, HKEY_LOCAL_MACHINE, &hkey); ok( !retl || retl == ERROR_DLL_INIT_FAILED || retl == ERROR_BAD_NETPATH, /* some win2k */ - "RegConnectRegistryA failed err = %d\n", retl); + "RegConnectRegistryA failed err = %ld\n", retl); if( !retl) RegCloseKey( hkey); SetLastError(0xdeadbeef); @@ -1649,12 +1649,12 @@ static void test_regconnectregistry( void) return; } - ok( schnd != NULL, "OpenSCManagerA failed err = %d\n", GetLastError()); + ok( schnd != NULL, "OpenSCManagerA failed err = %ld\n", GetLastError()); CloseServiceHandle( schnd); SetLastError(0xdeadbeef); schnd = OpenSCManagerA( netwName, NULL, GENERIC_READ); - ok( schnd != NULL, "OpenSCManagerA failed err = %d\n", GetLastError()); + ok( schnd != NULL, "OpenSCManagerA failed err = %ld\n", GetLastError()); CloseServiceHandle( schnd); } @@ -1667,10 +1667,10 @@ static void test_reg_query_value(void) LONG size, ret; ret = RegCreateKeyA(hkey_main, "subkey", &subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueA(subkey, NULL, REG_SZ, "data", 4); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* try an invalid hkey */ SetLastError(0xdeadbeef); @@ -1679,58 +1679,58 @@ static void test_reg_query_value(void) ok(ret == ERROR_INVALID_HANDLE || ret == ERROR_BADKEY || /* Windows 98 returns BADKEY */ ret == ERROR_ACCESS_DENIED, /* non-admin winxp */ - "Expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %d\n", ret); - ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %ld\n", ret); + ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %ld\n", GetLastError()); /* try a NULL hkey */ SetLastError(0xdeadbeef); size = MAX_PATH; ret = RegQueryValueA(NULL, "subkey", val, &size); ok(ret == ERROR_INVALID_HANDLE || ret == ERROR_BADKEY, /* Windows 98 returns BADKEY */ - "Expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %d\n", ret); - ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE or ERROR_BADKEY, got %ld\n", ret); + ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %ld\n", GetLastError()); /* try a NULL value */ size = MAX_PATH; ret = RegQueryValueA(hkey_main, "subkey", NULL, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); - ok(size == 5, "Expected 5, got %d\n", size); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); + ok(size == 5, "Expected 5, got %ld\n", size); /* try a NULL size */ SetLastError(0xdeadbeef); val[0] = '\0'; ret = RegQueryValueA(hkey_main, "subkey", val, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret); - ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %d\n", GetLastError()); + ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret); + ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %ld\n", GetLastError()); ok(!val[0], "Expected val to be untouched, got %s\n", val); /* try a NULL value and size */ ret = RegQueryValueA(hkey_main, "subkey", NULL, NULL); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* try a size too small */ SetLastError(0xdeadbeef); val[0] = '\0'; size = 1; ret = RegQueryValueA(hkey_main, "subkey", val, &size); - ok(ret == ERROR_MORE_DATA, "Expected ERROR_MORE_DATA, got %d\n", ret); - ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %d\n", GetLastError()); + ok(ret == ERROR_MORE_DATA, "Expected ERROR_MORE_DATA, got %ld\n", ret); + ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %ld\n", GetLastError()); ok(!val[0], "Expected val to be untouched, got %s\n", val); - ok(size == 5, "Expected 5, got %d\n", size); + ok(size == 5, "Expected 5, got %ld\n", size); /* successfully read the value using 'subkey' */ size = MAX_PATH; ret = RegQueryValueA(hkey_main, "subkey", val, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!lstrcmpA(val, "data"), "Expected 'data', got '%s'\n", val); - ok(size == 5, "Expected 5, got %d\n", size); + ok(size == 5, "Expected 5, got %ld\n", size); /* successfully read the value using the subkey key */ size = MAX_PATH; ret = RegQueryValueA(subkey, NULL, val, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!lstrcmpA(val, "data"), "Expected 'data', got '%s'\n", val); - ok(size == 5, "Expected 5, got %d\n", size); + ok(size == 5, "Expected 5, got %ld\n", size); /* unicode - try size too small */ SetLastError(0xdeadbeef); @@ -1742,38 +1742,38 @@ static void test_reg_query_value(void) win_skip("RegQueryValueW is not implemented\n"); goto cleanup; } - ok(ret == ERROR_MORE_DATA, "Expected ERROR_MORE_DATA, got %d\n", ret); - ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %d\n", GetLastError()); + ok(ret == ERROR_MORE_DATA, "Expected ERROR_MORE_DATA, got %ld\n", ret); + ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %ld\n", GetLastError()); ok(!valW[0], "Expected valW to be untouched\n"); - ok(size == 10, "Got wrong size: %d\n", size); + ok(size == 10, "Got wrong size: %ld\n", size); /* unicode - try size in WCHARS */ SetLastError(0xdeadbeef); size = ARRAY_SIZE(valW); ret = RegQueryValueW(subkey, NULL, valW, &size); - ok(ret == ERROR_MORE_DATA, "Expected ERROR_MORE_DATA, got %d\n", ret); - ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %d\n", GetLastError()); + ok(ret == ERROR_MORE_DATA, "Expected ERROR_MORE_DATA, got %ld\n", ret); + ok(GetLastError() == 0xdeadbeef, "Expected 0xdeadbeef, got %ld\n", GetLastError()); ok(!valW[0], "Expected valW to be untouched\n"); - ok(size == 10, "Got wrong size: %d\n", size); + ok(size == 10, "Got wrong size: %ld\n", size); /* unicode - successfully read the value */ size = sizeof(valW); ret = RegQueryValueW(subkey, NULL, valW, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!lstrcmpW(valW, L"data"), "Got wrong value\n"); - ok(size == 10, "Got wrong size: %d\n", size); + ok(size == 10, "Got wrong size: %ld\n", size); /* unicode - set the value without a NULL terminator */ ret = RegSetValueW(subkey, NULL, REG_SZ, L"data", 8); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* unicode - read the unterminated value, value is terminated for us */ memset(valW, 'a', sizeof(valW)); size = sizeof(valW); ret = RegQueryValueW(subkey, NULL, valW, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!lstrcmpW(valW, L"data"), "Got wrong value\n"); - ok(size == 10, "Got wrong size: %d\n", size); + ok(size == 10, "Got wrong size: %ld\n", size); cleanup: RegDeleteKeyA(subkey, ""); @@ -1799,134 +1799,134 @@ static void test_reg_query_info(void) FILETIME lastwrite; ret = RegCreateKeyExA(hkey_main, "subkey", 0, subkey_class, 0, KEY_ALL_ACCESS, NULL, &subkey, NULL); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* all parameters NULL */ ret = RegQueryInfoKeyA(NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_INVALID_HANDLE, "ret = %d\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "ret = %ld\n", ret); ret = RegQueryInfoKeyW(NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_INVALID_HANDLE, "ret = %d\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "ret = %ld\n", ret); /* not requesting any information */ ret = RegQueryInfoKeyA(subkey, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); ret = RegQueryInfoKeyW(subkey, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); /* class without length is invalid */ memset(classbuffer, 0x55, sizeof(classbuffer)); ret = RegQueryInfoKeyA(subkey, classbuffer, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "ret = %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "ret = %ld\n", ret); ok(classbuffer[0] == 0x55, "classbuffer[0] = 0x%x\n", classbuffer[0]); memset(classbufferW, 0x55, sizeof(classbufferW)); ret = RegQueryInfoKeyW(subkey, classbufferW, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "ret = %d\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "ret = %ld\n", ret); ok(classbufferW[0] == 0x5555, "classbufferW[0] = 0x%x\n", classbufferW[0]); /* empty key */ sdlen = classlen =0; ret = RegQueryInfoKeyA(subkey, NULL, &classlen, NULL, &subkeys, &maxsubkeylen, &maxclasslen, &values, &maxvaluenamelen, &maxvaluelen, &sdlen, &lastwrite); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == strlen(subkey_class), "classlen = %u\n", classlen); - ok(subkeys == 0, "subkeys = %u\n", subkeys); - ok(maxsubkeylen == 0, "maxsubkeylen = %u\n", maxsubkeylen); - ok(maxclasslen == 0, "maxclasslen = %u\n", maxclasslen); - ok(values == 0, "values = %u\n", values); - ok(maxvaluenamelen == 0, "maxvaluenamelen = %u\n", maxvaluenamelen); - ok(maxvaluelen == 0, "maxvaluelen = %u\n", maxvaluelen); - todo_wine ok(sdlen != 0, "sdlen = %u\n", sdlen); - ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %u\n", lastwrite.dwLowDateTime); - ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %u\n", lastwrite.dwHighDateTime); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == strlen(subkey_class), "classlen = %lu\n", classlen); + ok(subkeys == 0, "subkeys = %lu\n", subkeys); + ok(maxsubkeylen == 0, "maxsubkeylen = %lu\n", maxsubkeylen); + ok(maxclasslen == 0, "maxclasslen = %lu\n", maxclasslen); + ok(values == 0, "values = %lu\n", values); + ok(maxvaluenamelen == 0, "maxvaluenamelen = %lu\n", maxvaluenamelen); + ok(maxvaluelen == 0, "maxvaluelen = %lu\n", maxvaluelen); + todo_wine ok(sdlen != 0, "sdlen = %lu\n", sdlen); + ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %lu\n", lastwrite.dwLowDateTime); + ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %lu\n", lastwrite.dwHighDateTime); sdlen = classlen = 0; ret = RegQueryInfoKeyW(subkey, NULL, &classlen, NULL, &subkeys, &maxsubkeylen, &maxclasslen, &values, &maxvaluenamelen, &maxvaluelen, &sdlen, &lastwrite); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == strlen(subkey_class), "classlen = %u\n", classlen); - ok(subkeys == 0, "subkeys = %u\n", subkeys); - ok(maxsubkeylen == 0, "maxsubkeylen = %u\n", maxsubkeylen); - ok(maxclasslen == 0, "maxclasslen = %u\n", maxclasslen); - ok(values == 0, "values = %u\n", values); - ok(maxvaluenamelen == 0, "maxvaluenamelen = %u\n", maxvaluenamelen); - ok(maxvaluelen == 0, "maxvaluelen = %u\n", maxvaluelen); - todo_wine ok(sdlen != 0, "sdlen = %u\n", sdlen); - ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %u\n", lastwrite.dwLowDateTime); - ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %u\n", lastwrite.dwHighDateTime); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == strlen(subkey_class), "classlen = %lu\n", classlen); + ok(subkeys == 0, "subkeys = %lu\n", subkeys); + ok(maxsubkeylen == 0, "maxsubkeylen = %lu\n", maxsubkeylen); + ok(maxclasslen == 0, "maxclasslen = %lu\n", maxclasslen); + ok(values == 0, "values = %lu\n", values); + ok(maxvaluenamelen == 0, "maxvaluenamelen = %lu\n", maxvaluenamelen); + ok(maxvaluelen == 0, "maxvaluelen = %lu\n", maxvaluelen); + todo_wine ok(sdlen != 0, "sdlen = %lu\n", sdlen); + ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %lu\n", lastwrite.dwLowDateTime); + ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %lu\n", lastwrite.dwHighDateTime); ret = RegCreateKeyExA(subkey, "subsubkey", 0, subsubkey_class, 0, KEY_ALL_ACCESS, NULL, &subsubkey, NULL); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueExA(subkey, NULL, 0, REG_SZ, (const BYTE*)"data", 5); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* with subkey & default value */ sdlen = classlen = 0; ret = RegQueryInfoKeyA(subkey, NULL, &classlen, NULL, &subkeys, &maxsubkeylen, &maxclasslen, &values, &maxvaluenamelen, &maxvaluelen, &sdlen, &lastwrite); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == strlen(subkey_class), "classlen = %u\n", classlen); - ok(subkeys == 1, "subkeys = %u\n", subkeys); - ok(maxsubkeylen == strlen("subsubkey"), "maxsubkeylen = %u\n", maxsubkeylen); - ok(maxclasslen == strlen(subsubkey_class), "maxclasslen = %u\n", maxclasslen); - ok(values == 1, "values = %u\n", values); - ok(maxvaluenamelen == 0, "maxvaluenamelen = %u\n", maxvaluenamelen); - ok(maxvaluelen == sizeof("data") * sizeof(WCHAR), "maxvaluelen = %u\n", maxvaluelen); - todo_wine ok(sdlen != 0, "sdlen = %u\n", sdlen); - ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %u\n", lastwrite.dwLowDateTime); - ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %u\n", lastwrite.dwHighDateTime); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == strlen(subkey_class), "classlen = %lu\n", classlen); + ok(subkeys == 1, "subkeys = %lu\n", subkeys); + ok(maxsubkeylen == strlen("subsubkey"), "maxsubkeylen = %lu\n", maxsubkeylen); + ok(maxclasslen == strlen(subsubkey_class), "maxclasslen = %lu\n", maxclasslen); + ok(values == 1, "values = %lu\n", values); + ok(maxvaluenamelen == 0, "maxvaluenamelen = %lu\n", maxvaluenamelen); + ok(maxvaluelen == sizeof("data") * sizeof(WCHAR), "maxvaluelen = %lu\n", maxvaluelen); + todo_wine ok(sdlen != 0, "sdlen = %lu\n", sdlen); + ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %lu\n", lastwrite.dwLowDateTime); + ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %lu\n", lastwrite.dwHighDateTime); sdlen = classlen = 0; ret = RegQueryInfoKeyW(subkey, NULL, &classlen, NULL, &subkeys, &maxsubkeylen, &maxclasslen, &values, &maxvaluenamelen, &maxvaluelen, &sdlen, &lastwrite); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == strlen(subkey_class), "classlen = %u\n", classlen); - ok(subkeys == 1, "subkeys = %u\n", subkeys); - ok(maxsubkeylen == strlen("subsubkey"), "maxsubkeylen = %u\n", maxsubkeylen); - ok(maxclasslen == strlen(subsubkey_class), "maxclasslen = %u\n", maxclasslen); - ok(values == 1, "values = %u\n", values); - ok(maxvaluenamelen == 0, "maxvaluenamelen = %u\n", maxvaluenamelen); - ok(maxvaluelen == sizeof("data") * sizeof(WCHAR), "maxvaluelen = %u\n", maxvaluelen); - todo_wine ok(sdlen != 0, "sdlen = %u\n", sdlen); - ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %u\n", lastwrite.dwLowDateTime); - ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %u\n", lastwrite.dwHighDateTime); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == strlen(subkey_class), "classlen = %lu\n", classlen); + ok(subkeys == 1, "subkeys = %lu\n", subkeys); + ok(maxsubkeylen == strlen("subsubkey"), "maxsubkeylen = %lu\n", maxsubkeylen); + ok(maxclasslen == strlen(subsubkey_class), "maxclasslen = %lu\n", maxclasslen); + ok(values == 1, "values = %lu\n", values); + ok(maxvaluenamelen == 0, "maxvaluenamelen = %lu\n", maxvaluenamelen); + ok(maxvaluelen == sizeof("data") * sizeof(WCHAR), "maxvaluelen = %lu\n", maxvaluelen); + todo_wine ok(sdlen != 0, "sdlen = %lu\n", sdlen); + ok(lastwrite.dwLowDateTime != 0, "lastwrite.dwLowDateTime = %lu\n", lastwrite.dwLowDateTime); + ok(lastwrite.dwHighDateTime != 0, "lastwrite.dwHighDateTime = %lu\n", lastwrite.dwHighDateTime); ret = RegSetValueExA(subkey, "value one", 0, REG_SZ, (const BYTE*)"first value data", 17); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueExA(subkey, "value 2", 0, REG_SZ, (const BYTE*)"second value data", 18); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* with named value */ classlen = 0; ret = RegQueryInfoKeyA(subkey, NULL, &classlen, NULL, &subkeys, &maxsubkeylen, &maxclasslen, &values, &maxvaluenamelen, &maxvaluelen, &sdlen, &lastwrite); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(values == 3, "values = %u\n", values); - ok(maxvaluenamelen == strlen("value one"), "maxvaluenamelen = %u\n", maxvaluenamelen); - ok(maxvaluelen == sizeof("second value data") * sizeof(WCHAR), "maxvaluelen = %u\n", maxvaluelen); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(values == 3, "values = %lu\n", values); + ok(maxvaluenamelen == strlen("value one"), "maxvaluenamelen = %lu\n", maxvaluenamelen); + ok(maxvaluelen == sizeof("second value data") * sizeof(WCHAR), "maxvaluelen = %lu\n", maxvaluelen); classlen = 0; ret = RegQueryInfoKeyW(subkey, NULL, &classlen, NULL, &subkeys, &maxsubkeylen, &maxclasslen, &values, &maxvaluenamelen, &maxvaluelen, &sdlen, &lastwrite); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(values == 3, "values = %u\n", values); - ok(maxvaluenamelen == strlen("value one"), "maxvaluenamelen = %u\n", maxvaluenamelen); - ok(maxvaluelen == sizeof("second value data") * sizeof(WCHAR), "maxvaluelen = %u\n", maxvaluelen); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(values == 3, "values = %lu\n", values); + ok(maxvaluenamelen == strlen("value one"), "maxvaluenamelen = %lu\n", maxvaluenamelen); + ok(maxvaluelen == sizeof("second value data") * sizeof(WCHAR), "maxvaluelen = %lu\n", maxvaluelen); /* class name with zero size buffer */ memset(classbuffer, 0x55, sizeof(classbuffer)); classlen = 0; ret = RegQueryInfoKeyA(subkey, classbuffer, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); ok(classlen == strlen(subkey_class) /* win2k */ || - classlen == 0, "classlen = %u\n", classlen); + classlen == 0, "classlen = %lu\n", classlen); memset(expectbuffer, 0x55, sizeof(expectbuffer)); ok(!memcmp(classbuffer, expectbuffer, sizeof(classbuffer)), "classbuffer was modified\n"); memset(classbufferW, 0x55, sizeof(classbufferW)); classlen = 0; ret = RegQueryInfoKeyW(subkey, classbufferW, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); ok(classlen == strlen(subkey_class) /* win2k */ || - classlen == 0, "classlen = %u\n", classlen); + classlen == 0, "classlen = %lu\n", classlen); memset(expectbufferW, 0x55, sizeof(expectbufferW)); ok(!memcmp(classbufferW, expectbufferW, sizeof(classbufferW)), "classbufferW was modified\n"); @@ -1934,8 +1934,8 @@ static void test_reg_query_info(void) memset(classbuffer, 0x55, sizeof(classbuffer)); classlen = 1; ret = RegQueryInfoKeyA(subkey, classbuffer, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_MORE_DATA, "ret = %d\n", ret); - ok(classlen == 0, "classlen = %u\n", classlen); + ok(ret == ERROR_MORE_DATA, "ret = %ld\n", ret); + ok(classlen == 0, "classlen = %lu\n", classlen); memset(expectbuffer, 0x55, sizeof(expectbuffer)); expectbuffer[0] = 0; ok(!memcmp(classbuffer, expectbuffer, sizeof(classbuffer)), "classbuffer was modified\n"); @@ -1944,9 +1944,9 @@ static void test_reg_query_info(void) classlen = 1; ret = RegQueryInfoKeyW(subkey, classbufferW, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); /* failure-code changed to ERROR_MORE_DATA in recent win10 */ - ok((ret == ERROR_INSUFFICIENT_BUFFER) || (ret == ERROR_MORE_DATA), "ret = %d\n", ret); + ok((ret == ERROR_INSUFFICIENT_BUFFER) || (ret == ERROR_MORE_DATA), "ret = %ld\n", ret); ok(classlen == 0 /* win8 */ || - classlen == strlen(subkey_class), "classlen = %u\n", classlen); + classlen == strlen(subkey_class), "classlen = %lu\n", classlen); memset(expectbufferW, 0x55, sizeof(expectbufferW)); ok(!memcmp(classbufferW, expectbufferW, sizeof(classbufferW)), "classbufferW was modified\n"); @@ -1954,8 +1954,8 @@ static void test_reg_query_info(void) memset(classbuffer, 0x55, sizeof(classbuffer)); classlen = sizeof(subkey_class) - 1; ret = RegQueryInfoKeyA(subkey, classbuffer, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_MORE_DATA, "ret = %d\n", ret); - ok(classlen == sizeof(subkey_class) - 2, "classlen = %u\n", classlen); + ok(ret == ERROR_MORE_DATA, "ret = %ld\n", ret); + ok(classlen == sizeof(subkey_class) - 2, "classlen = %lu\n", classlen); memset(expectbuffer, 0x55, sizeof(expectbuffer)); strcpy(expectbuffer, subkey_class); expectbuffer[sizeof(subkey_class) - 2] = 0; @@ -1967,9 +1967,9 @@ static void test_reg_query_info(void) memset(classbufferW, 0x55, sizeof(classbufferW)); classlen = sizeof(subkey_class) - 1; ret = RegQueryInfoKeyW(subkey, classbufferW, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_INSUFFICIENT_BUFFER, "ret = %d\n", ret); + ok(ret == ERROR_INSUFFICIENT_BUFFER, "ret = %ld\n", ret); ok(classlen == sizeof(subkey_class) - 2 /* win8 */ || - classlen == strlen(subkey_class), "classlen = %u\n", classlen); + classlen == strlen(subkey_class), "classlen = %lu\n", classlen); memset(expectbufferW, 0x55, sizeof(expectbufferW)); ok(!memcmp(classbufferW, expectbufferW, sizeof(classbufferW)), "classbufferW was modified\n"); @@ -1977,8 +1977,8 @@ static void test_reg_query_info(void) memset(classbuffer, 0x55, sizeof(classbuffer)); classlen = sizeof(subkey_class); ret = RegQueryInfoKeyA(subkey, classbuffer, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == sizeof(subkey_class) - 1, "classlen = %u\n", classlen); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == sizeof(subkey_class) - 1, "classlen = %lu\n", classlen); memset(expectbuffer, 0x55, sizeof(expectbuffer)); strcpy(expectbuffer, subkey_class); ok(!memcmp(classbuffer, expectbuffer, sizeof(classbuffer)), @@ -1988,8 +1988,8 @@ static void test_reg_query_info(void) memset(classbuffer, 0x55, sizeof(classbuffer)); classlen = 0xdeadbeef; ret = RegQueryInfoKeyA(subkey, classbuffer, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == sizeof(subkey_class) - 1, "classlen = %u\n", classlen); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == sizeof(subkey_class) - 1, "classlen = %lu\n", classlen); memset(expectbuffer, 0x55, sizeof(expectbuffer)); strcpy(expectbuffer, subkey_class); ok(!memcmp(classbuffer, expectbuffer, sizeof(classbuffer)), @@ -1999,8 +1999,8 @@ static void test_reg_query_info(void) memset(classbufferW, 0x55, sizeof(classbufferW)); classlen = sizeof(subkey_class); ret = RegQueryInfoKeyW(subkey, classbufferW, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == sizeof(subkey_class) - 1, "classlen = %u\n", classlen); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == sizeof(subkey_class) - 1, "classlen = %lu\n", classlen); memset(expectbufferW, 0x55, sizeof(expectbufferW)); lstrcpyW(expectbufferW, subkey_classW); ok(!memcmp(classbufferW, expectbufferW, sizeof(classbufferW)), @@ -2010,8 +2010,8 @@ static void test_reg_query_info(void) memset(classbufferW, 0x55, sizeof(classbufferW)); classlen = 0xdeadbeef; ret = RegQueryInfoKeyW(subkey, classbufferW, &classlen, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "ret = %d\n", ret); - ok(classlen == sizeof(subkey_class) - 1, "classlen = %u\n", classlen); + ok(ret == ERROR_SUCCESS, "ret = %ld\n", ret); + ok(classlen == sizeof(subkey_class) - 1, "classlen = %lu\n", classlen); memset(expectbufferW, 0x55, sizeof(expectbufferW)); lstrcpyW(expectbufferW, subkey_classW); ok(!memcmp(classbufferW, expectbufferW, sizeof(classbufferW)), @@ -2034,68 +2034,68 @@ static void test_string_termination(void) DWORD insize, outsize, nsize; ret = RegCreateKeyA(hkey_main, "string_termination", &subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* Off-by-one RegSetValueExA -> adds a trailing '\0'! */ insize=sizeof(string)-1; ret = RegSetValueExA(subkey, "stringtest", 0, REG_SZ, (BYTE*)string, insize); - ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %d\n", ret); + ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %ld\n", ret); outsize=insize; ret = RegQueryValueExA(subkey, "stringtest", NULL, NULL, buffer, &outsize); - ok(ret == ERROR_MORE_DATA, "RegQueryValueExA returned: %d\n", ret); + ok(ret == ERROR_MORE_DATA, "RegQueryValueExA returned: %ld\n", ret); /* Off-by-two RegSetValueExA -> no trailing '\0' */ insize=sizeof(string)-2; ret = RegSetValueExA(subkey, "stringtest", 0, REG_SZ, (BYTE*)string, insize); - ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %d\n", ret); + ok(ret == ERROR_SUCCESS, "RegSetValueExA failed: %ld\n", ret); outsize=0; ret = RegQueryValueExA(subkey, "stringtest", NULL, NULL, NULL, &outsize); - ok(ret == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", ret); - ok(outsize == insize, "wrong size %u != %u\n", outsize, insize); + ok(ret == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", ret); + ok(outsize == insize, "wrong size %lu != %lu\n", outsize, insize); /* RegQueryValueExA may return a string with no trailing '\0' */ outsize=insize; memset(buffer, 0xbd, sizeof(buffer)); ret = RegQueryValueExA(subkey, "stringtest", NULL, NULL, buffer, &outsize); - ok(ret == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", ret); - ok(outsize == insize, "wrong size: %u != %u\n", outsize, insize); - ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%u != %s\n", + ok(ret == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", ret); + ok(outsize == insize, "wrong size: %lu != %lu\n", outsize, insize); + ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%lu != %s\n", debugstr_an((char*)buffer, outsize), outsize, string); - ok(buffer[insize] == 0xbd, "buffer overflow at %u %02x\n", insize, buffer[insize]); + ok(buffer[insize] == 0xbd, "buffer overflow at %lu %02x\n", insize, buffer[insize]); /* RegQueryValueExA adds a trailing '\0' if there is room */ outsize=insize+1; memset(buffer, 0xbd, sizeof(buffer)); ret = RegQueryValueExA(subkey, "stringtest", NULL, NULL, buffer, &outsize); - ok(ret == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", ret); - ok(outsize == insize, "wrong size: %u != %u\n", outsize, insize); - ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%u != %s\n", + ok(ret == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", ret); + ok(outsize == insize, "wrong size: %lu != %lu\n", outsize, insize); + ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%lu != %s\n", debugstr_an((char*)buffer, outsize), outsize, string); - ok(buffer[insize] == 0, "buffer overflow at %u %02x\n", insize, buffer[insize]); + ok(buffer[insize] == 0, "buffer overflow at %lu %02x\n", insize, buffer[insize]); /* RegEnumValueA may return a string with no trailing '\0' */ outsize=insize; memset(buffer, 0xbd, sizeof(buffer)); nsize=sizeof(name); ret = RegEnumValueA(subkey, 0, name, &nsize, NULL, NULL, buffer, &outsize); - ok(ret == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", ret); + ok(ret == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", ret); ok(strcmp(name, "stringtest") == 0, "wrong name: %s\n", name); - ok(outsize == insize, "wrong size: %u != %u\n", outsize, insize); - ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%u != %s\n", + ok(outsize == insize, "wrong size: %lu != %lu\n", outsize, insize); + ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%lu != %s\n", debugstr_an((char*)buffer, outsize), outsize, string); - ok(buffer[insize] == 0xbd, "buffer overflow at %u %02x\n", insize, buffer[insize]); + ok(buffer[insize] == 0xbd, "buffer overflow at %lu %02x\n", insize, buffer[insize]); /* RegEnumValueA adds a trailing '\0' if there is room */ outsize=insize+1; memset(buffer, 0xbd, sizeof(buffer)); nsize=sizeof(name); ret = RegEnumValueA(subkey, 0, name, &nsize, NULL, NULL, buffer, &outsize); - ok(ret == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", ret); + ok(ret == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", ret); ok(strcmp(name, "stringtest") == 0, "wrong name: %s\n", name); - ok(outsize == insize, "wrong size: %u != %u\n", outsize, insize); - ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%u != %s\n", + ok(outsize == insize, "wrong size: %lu != %lu\n", outsize, insize); + ok(memcmp(buffer, string, outsize) == 0, "bad string: %s/%lu != %s\n", debugstr_an((char*)buffer, outsize), outsize, string); - ok(buffer[insize] == 0, "buffer overflow at %u %02x\n", insize, buffer[insize]); + ok(buffer[insize] == 0, "buffer overflow at %lu %02x\n", insize, buffer[insize]); RegDeleteKeyA(subkey, ""); RegCloseKey(subkey); @@ -2115,82 +2115,82 @@ static void test_reg_copy_tree(void) } ret = RegCreateKeyA(hkey_main, "src", &src); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCreateKeyA(hkey_main, "dst", &dst); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* Copy nonexistent subkey */ ret = pRegCopyTreeA(src, "nonexistent_subkey", dst); - ok(ret == ERROR_FILE_NOT_FOUND, "Expected ERROR_FILE_NOT_FOUND, got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "Expected ERROR_FILE_NOT_FOUND, got %ld\n", ret); /* Create test keys and values */ ret = RegSetValueA(src, NULL, REG_SZ, "data", 4); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueExA(src, "value", 0, REG_SZ, (const BYTE *)"data2", 5); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCreateKeyA(src, "subkey2", &subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueA(subkey, NULL, REG_SZ, "data3", 5); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueExA(subkey, "value", 0, REG_SZ, (const BYTE *)"data4", 5); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCreateKeyA(src, "subkey3", &subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); /* Copy subkey */ ret = pRegCopyTreeA(src, "subkey2", dst); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); size = MAX_PATH; ret = RegQueryValueA(dst, NULL, buffer, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!strcmp(buffer, "data3"), "Expected 'data3', got '%s'\n", buffer); dwsize = MAX_PATH; ret = RegQueryValueExA(dst, "value", NULL, &type, (BYTE *)buffer, &dwsize); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); - ok(type == REG_SZ, "Expected REG_SZ, got %u\n", type); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); + ok(type == REG_SZ, "Expected REG_SZ, got %lu\n", type); ok(!strcmp(buffer, "data4"), "Expected 'data4', got '%s'\n", buffer); /* Copy full tree */ ret = pRegCopyTreeA(src, NULL, dst); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); size = MAX_PATH; ret = RegQueryValueA(dst, NULL, buffer, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!strcmp(buffer, "data"), "Expected 'data', got '%s'\n", buffer); dwsize = MAX_PATH; ret = RegQueryValueExA(dst, "value", NULL, &type, (BYTE *)buffer, &dwsize); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); - ok(type == REG_SZ, "Expected REG_SZ, got %u\n", type); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); + ok(type == REG_SZ, "Expected REG_SZ, got %lu\n", type); ok(!strcmp(buffer, "data2"), "Expected 'data2', got '%s'\n", buffer); ret = RegOpenKeyA(dst, "subkey2", &subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); size = MAX_PATH; ret = RegQueryValueA(subkey, NULL, buffer, &size); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!strcmp(buffer, "data3"), "Expected 'data3', got '%s'\n", buffer); dwsize = MAX_PATH; ret = RegQueryValueExA(subkey, "value", NULL, &type, (BYTE *)buffer, &dwsize); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); - ok(type == REG_SZ, "Expected REG_SZ, got %u\n", type); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); + ok(type == REG_SZ, "Expected REG_SZ, got %lu\n", type); ok(!strcmp(buffer, "data4"), "Expected 'data4', got '%s'\n", buffer); ret = RegCloseKey(subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegOpenKeyA(dst, "subkey3", &subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); delete_key(src); delete_key(dst); @@ -2209,18 +2209,18 @@ static void test_reg_delete_tree(void) } ret = RegCreateKeyA(hkey_main, "subkey", &subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCreateKeyA(subkey, "subkey2", &subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueA(subkey, NULL, REG_SZ, "data", 4); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueA(subkey2, NULL, REG_SZ, "data2", 5); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = pRegDeleteTreeA(subkey, "subkey2"); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(RegOpenKeyA(subkey, "subkey2", &subkey2), "subkey2 was not deleted\n"); size = MAX_PATH; @@ -2228,30 +2228,30 @@ static void test_reg_delete_tree(void) "Default value of subkey no longer present\n"); ret = RegCreateKeyA(subkey, "subkey2", &subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = pRegDeleteTreeA(hkey_main, "subkey\\subkey2"); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(RegOpenKeyA(subkey, "subkey2", &subkey2), "subkey2 was not deleted\n"); ok(!RegQueryValueA(subkey, NULL, buffer, &size), "Default value of subkey no longer present\n"); ret = RegCreateKeyA(subkey, "subkey2", &subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCreateKeyA(subkey, "subkey3", &subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey2); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueA(subkey, NULL, REG_SZ, "data", 4); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegSetValueExA(subkey, "value", 0, REG_SZ, (const BYTE *)"data2", 5); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = pRegDeleteTreeA(subkey, NULL); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ok(!RegOpenKeyA(hkey_main, "subkey", &subkey), "subkey was deleted\n"); ok(RegOpenKeyA(subkey, "subkey2", &subkey2), @@ -2267,23 +2267,23 @@ static void test_reg_delete_tree(void) ok(RegQueryValueExA(subkey, "value", NULL, &type, (BYTE *)buffer, &dwsize), "Value is still present\n"); ret = RegCloseKey(subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegOpenKeyA(hkey_main, "subkey", &subkey); ok(ret == ERROR_SUCCESS, "subkey was deleted\n"); ret = pRegDeleteTreeA(subkey, ""); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegCloseKey(subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = RegOpenKeyA(hkey_main, "subkey", &subkey); ok(ret == ERROR_SUCCESS, "subkey was deleted\n"); ret = RegCloseKey(subkey); - ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n", ret); ret = pRegDeleteTreeA(hkey_main, "not-here"); ok(ret == ERROR_FILE_NOT_FOUND, - "Expected ERROR_FILE_NOT_FOUND, got %d\n", ret); + "Expected ERROR_FILE_NOT_FOUND, got %ld\n", ret); } static void test_rw_order(void) @@ -2313,7 +2313,7 @@ static void test_rw_order(void) ok(!RegQueryInfoKeyA(hKey, NULL, NULL, NULL, NULL, NULL, NULL, &values, &value_name_max_len, NULL, NULL, NULL), "RegQueryInfoKeyA failed\n"); - ok(values == 4, "Expected 4 values, got %u\n", values); + ok(values == 4, "Expected 4 values, got %lu\n", values); /* Value enumeration preserves RegSetValueEx call order */ value_len = 2; @@ -2357,103 +2357,103 @@ static void test_symlinks(void) err = RegCreateKeyExA( hkey_main, "link", 0, NULL, REG_OPTION_CREATE_LINK, KEY_ALL_ACCESS, NULL, &link, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed: %lu\n", err ); /* REG_SZ is not allowed */ err = RegSetValueExA( link, "SymbolicLinkValue", 0, REG_SZ, (BYTE *)"foobar", sizeof("foobar") ); - ok( err == ERROR_ACCESS_DENIED, "RegSetValueEx wrong error %u\n", err ); + ok( err == ERROR_ACCESS_DENIED, "RegSetValueEx wrong error %lu\n", err ); err = RegSetValueExA( link, "SymbolicLinkValue", 0, REG_LINK, (BYTE *)target, target_len - sizeof(WCHAR) ); - ok( err == ERROR_SUCCESS, "RegSetValueEx failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegSetValueEx failed error %lu\n", err ); /* other values are not allowed */ err = RegSetValueExA( link, "link", 0, REG_LINK, (BYTE *)target, target_len - sizeof(WCHAR) ); - ok( err == ERROR_ACCESS_DENIED, "RegSetValueEx wrong error %u\n", err ); + ok( err == ERROR_ACCESS_DENIED, "RegSetValueEx wrong error %lu\n", err ); /* try opening the target through the link */ err = RegOpenKeyA( hkey_main, "link", &key ); - ok( err == ERROR_FILE_NOT_FOUND, "RegOpenKey wrong error %u\n", err ); + ok( err == ERROR_FILE_NOT_FOUND, "RegOpenKey wrong error %lu\n", err ); err = RegCreateKeyExA( hkey_main, "target", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed error %lu\n", err ); dw = 0xbeef; err = RegSetValueExA( key, "value", 0, REG_DWORD, (BYTE *)&dw, sizeof(dw) ); - ok( err == ERROR_SUCCESS, "RegSetValueEx failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegSetValueEx failed error %lu\n", err ); RegCloseKey( key ); err = RegOpenKeyA( hkey_main, "link", &key ); - ok( err == ERROR_SUCCESS, "RegOpenKey failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegOpenKey failed error %lu\n", err ); len = sizeof(buffer); err = RegQueryValueExA( key, "value", NULL, &type, buffer, &len ); - ok( err == ERROR_SUCCESS, "RegOpenKey failed error %u\n", err ); - ok( len == sizeof(DWORD), "wrong len %u\n", len ); + ok( err == ERROR_SUCCESS, "RegOpenKey failed error %lu\n", err ); + ok( len == sizeof(DWORD), "wrong len %lu\n", len ); len = sizeof(buffer); err = RegQueryValueExA( key, "SymbolicLinkValue", NULL, &type, buffer, &len ); - ok( err == ERROR_FILE_NOT_FOUND, "RegQueryValueEx wrong error %u\n", err ); + ok( err == ERROR_FILE_NOT_FOUND, "RegQueryValueEx wrong error %lu\n", err ); /* REG_LINK can be created in non-link keys */ err = RegSetValueExA( key, "SymbolicLinkValue", 0, REG_LINK, (BYTE *)target, target_len - sizeof(WCHAR) ); - ok( err == ERROR_SUCCESS, "RegSetValueEx failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegSetValueEx failed error %lu\n", err ); len = sizeof(buffer); err = RegQueryValueExA( key, "SymbolicLinkValue", NULL, &type, buffer, &len ); - ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %u\n", err ); - ok( len == target_len - sizeof(WCHAR), "wrong len %u\n", len ); + ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %lu\n", err ); + ok( len == target_len - sizeof(WCHAR), "wrong len %lu\n", len ); err = RegDeleteValueA( key, "SymbolicLinkValue" ); - ok( err == ERROR_SUCCESS, "RegDeleteValue failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegDeleteValue failed error %lu\n", err ); RegCloseKey( key ); err = RegCreateKeyExA( hkey_main, "link", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed error %lu\n", err ); len = sizeof(buffer); err = RegQueryValueExA( key, "value", NULL, &type, buffer, &len ); - ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %u\n", err ); - ok( len == sizeof(DWORD), "wrong len %u\n", len ); + ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %lu\n", err ); + ok( len == sizeof(DWORD), "wrong len %lu\n", len ); err = RegQueryValueExA( key, "SymbolicLinkValue", NULL, &type, buffer, &len ); - ok( err == ERROR_FILE_NOT_FOUND, "RegQueryValueEx wrong error %u\n", err ); + ok( err == ERROR_FILE_NOT_FOUND, "RegQueryValueEx wrong error %lu\n", err ); RegCloseKey( key ); /* now open the symlink itself */ err = RegOpenKeyExA( hkey_main, "link", REG_OPTION_OPEN_LINK, KEY_ALL_ACCESS, &key ); - ok( err == ERROR_SUCCESS, "RegOpenKeyEx failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegOpenKeyEx failed error %lu\n", err ); len = sizeof(buffer); err = RegQueryValueExA( key, "SymbolicLinkValue", NULL, &type, buffer, &len ); - ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %u\n", err ); - ok( len == target_len - sizeof(WCHAR), "wrong len %u\n", len ); + ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %lu\n", err ); + ok( len == target_len - sizeof(WCHAR), "wrong len %lu\n", len ); RegCloseKey( key ); err = RegCreateKeyExA( hkey_main, "link", 0, NULL, REG_OPTION_OPEN_LINK, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyEx failed error %lu\n", err ); len = sizeof(buffer); err = RegQueryValueExA( key, "SymbolicLinkValue", NULL, &type, buffer, &len ); - ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %u\n", err ); - ok( len == target_len - sizeof(WCHAR), "wrong len %u\n", len ); + ok( err == ERROR_SUCCESS, "RegQueryValueEx failed error %lu\n", err ); + ok( len == target_len - sizeof(WCHAR), "wrong len %lu\n", len ); RegCloseKey( key ); err = RegCreateKeyExA( hkey_main, "link", 0, NULL, REG_OPTION_CREATE_LINK, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_ALREADY_EXISTS, "RegCreateKeyEx wrong error %u\n", err ); + ok( err == ERROR_ALREADY_EXISTS, "RegCreateKeyEx wrong error %lu\n", err ); err = RegCreateKeyExA( hkey_main, "link", 0, NULL, REG_OPTION_CREATE_LINK | REG_OPTION_OPEN_LINK, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_ALREADY_EXISTS, "RegCreateKeyEx wrong error %u\n", err ); + ok( err == ERROR_ALREADY_EXISTS, "RegCreateKeyEx wrong error %lu\n", err ); err = RegDeleteKeyA( hkey_main, "target" ); - ok( err == ERROR_SUCCESS, "RegDeleteKey failed error %u\n", err ); + ok( err == ERROR_SUCCESS, "RegDeleteKey failed error %lu\n", err ); err = RegDeleteKeyA( hkey_main, "link" ); - ok( err == ERROR_FILE_NOT_FOUND, "RegDeleteKey wrong error %u\n", err ); + ok( err == ERROR_FILE_NOT_FOUND, "RegDeleteKey wrong error %lu\n", err ); status = pNtDeleteKey( link ); - ok( !status, "NtDeleteKey failed: 0x%08x\n", status ); + ok( !status, "NtDeleteKey failed: 0x%08lx\n", status ); RegCloseKey( link ); HeapFree( GetProcessHeap(), 0, target ); @@ -2467,13 +2467,13 @@ static DWORD get_key_value( HKEY root, const char *name, DWORD flags ) err = RegCreateKeyExA( root, name, 0, NULL, 0, flags | KEY_ALL_ACCESS, NULL, &key, NULL ); if (err == ERROR_FILE_NOT_FOUND) return 0; - ok( err == ERROR_SUCCESS, "%08x: RegCreateKeyEx failed: %u\n", flags, err ); + ok( err == ERROR_SUCCESS, "%08lx: RegCreateKeyEx failed: %lu\n", flags, err ); err = RegQueryValueExA( key, "value", NULL, &type, (BYTE *)&dw, &len ); if (err == ERROR_FILE_NOT_FOUND) dw = 0; else - ok( err == ERROR_SUCCESS, "%08x: RegQueryValueEx failed: %u\n", flags, err ); + ok( err == ERROR_SUCCESS, "%08lx: RegQueryValueEx failed: %lu\n", flags, err ); RegCloseKey( key ); return dw; } @@ -2481,7 +2481,7 @@ static DWORD get_key_value( HKEY root, const char *name, DWORD flags ) static void _check_key_value( int line, HANDLE root, const char *name, DWORD flags, DWORD expect ) { DWORD dw = get_key_value( root, name, flags ); - ok_(__FILE__,line)( dw == expect, "%08x: wrong value %u/%u\n", flags, dw, expect ); + ok_(__FILE__,line)( dw == expect, "%08lx: wrong value %lu/%lu\n", flags, dw, expect ); } #define check_key_value(root,name,flags,expect) _check_key_value( __LINE__, root, name, flags, expect ) @@ -2510,43 +2510,43 @@ static void test_redirection(void) err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &root64, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &root32, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wine\\Winetest", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &key64, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wine\\Winetest", 0, NULL, 0, KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &key32, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); dw = 64; err = RegSetValueExA( key64, "value", 0, REG_DWORD, (BYTE *)&dw, sizeof(dw) ); - ok( err == ERROR_SUCCESS, "RegSetValueExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegSetValueExA failed: %lu\n", err ); dw = 32; err = RegSetValueExA( key32, "value", 0, REG_DWORD, (BYTE *)&dw, sizeof(dw) ); - ok( err == ERROR_SUCCESS, "RegSetValueExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegSetValueExA failed: %lu\n", err ); dw = 0; len = sizeof(dw); err = RegQueryValueExA( key32, "value", NULL, &type, (BYTE *)&dw, &len ); - ok( err == ERROR_SUCCESS, "RegQueryValueExA failed: %u\n", err ); - ok( dw == 32, "wrong value %u\n", dw ); + ok( err == ERROR_SUCCESS, "RegQueryValueExA failed: %lu\n", err ); + ok( dw == 32, "wrong value %lu\n", dw ); dw = 0; len = sizeof(dw); err = RegQueryValueExA( key64, "value", NULL, &type, (BYTE *)&dw, &len ); - ok( err == ERROR_SUCCESS, "RegQueryValueExA failed: %u\n", err ); - ok( dw == 64, "wrong value %u\n", dw ); + ok( err == ERROR_SUCCESS, "RegQueryValueExA failed: %lu\n", err ); + ok( dw == 64, "wrong value %lu\n", dw ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); if (ptr_size == 32) { @@ -2580,20 +2580,20 @@ static void test_redirection(void) { err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); dw = get_key_value( key, "Wine\\Winetest", 0 ); - ok( dw == 64 || broken(dw == 32) /* xp64 */, "wrong value %u\n", dw ); + ok( dw == 64 || broken(dw == 32) /* xp64 */, "wrong value %lu\n", dw ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_64KEY, 64 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_32KEY, 32 ); check_key_value( key, "Wow6432Node\\Wine\\Winetest", 0, 32 ); dw = get_key_value( key, "Wow6432Node\\Wine\\Winetest", KEY_WOW64_64KEY ); - ok( dw == 32 || broken(dw == 64) /* xp64 */, "wrong value %u\n", dw ); + ok( dw == 32 || broken(dw == 64) /* xp64 */, "wrong value %lu\n", dw ); check_key_value( key, "Wow6432Node\\Wine\\Winetest", KEY_WOW64_32KEY, 32 ); RegCloseKey( key ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software", 0, NULL, 0, KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Wine\\Winetest", 0, 32 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_32KEY, 32 ); @@ -2606,20 +2606,20 @@ static void test_redirection(void) { err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Wine\\Winetest", 0, 64 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_64KEY, 64 ); dw = get_key_value( key, "Wine\\Winetest", KEY_WOW64_32KEY ); - todo_wine ok( dw == 32, "wrong value %u\n", dw ); + todo_wine ok( dw == 32, "wrong value %lu\n", dw ); check_key_value( key, "Wow6432Node\\Wine\\Winetest", 0, 32 ); RegCloseKey( key ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software", 0, NULL, 0, KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Wine\\Winetest", 0, 32 ); dw = get_key_value( key, "Wine\\Winetest", KEY_WOW64_64KEY ); - ok( dw == 32 || broken(dw == 64) /* vista */, "wrong value %u\n", dw ); + ok( dw == 32 || broken(dw == 64) /* vista */, "wrong value %lu\n", dw ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_32KEY, 32 ); RegCloseKey( key ); } @@ -2644,7 +2644,7 @@ static void test_redirection(void) err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wow6432Node", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Wine\\Winetest", 0, 32 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_32KEY, 32 ); @@ -2654,16 +2654,16 @@ static void test_redirection(void) { err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wow6432Node", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); dw = get_key_value( key, "Wine\\Winetest", 0 ); - ok( dw == (is_vista ? 64 : 32) || broken(dw == 32) /* xp64 */, "wrong value %u\n", dw ); + ok( dw == (is_vista ? 64 : 32) || broken(dw == 32) /* xp64 */, "wrong value %lu\n", dw ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_32KEY, 32 ); RegCloseKey( key ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wow6432Node", 0, NULL, 0, KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Wine\\Winetest", 0, 32 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Wine\\Winetest", KEY_WOW64_32KEY, 32 ); @@ -2672,7 +2672,7 @@ static void test_redirection(void) err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wow6432Node\\Wine", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Winetest", 0, 32 ); check_key_value( key, "Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Winetest", KEY_WOW64_32KEY, 32 ); @@ -2682,16 +2682,16 @@ static void test_redirection(void) { err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wow6432Node\\Wine", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); dw = get_key_value( key, "Winetest", 0 ); - ok( dw == 32 || (is_vista && dw == 64), "wrong value %u\n", dw ); + ok( dw == 32 || (is_vista && dw == 64), "wrong value %lu\n", dw ); check_key_value( key, "Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Winetest", KEY_WOW64_32KEY, 32 ); RegCloseKey( key ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wow6432Node\\Wine", 0, NULL, 0, KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Winetest", 0, 32 ); check_key_value( key, "Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Winetest", KEY_WOW64_32KEY, 32 ); @@ -2700,29 +2700,29 @@ static void test_redirection(void) err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Winetest", 0, ptr_size ); check_key_value( key, "Winetest", KEY_WOW64_64KEY, is_vista ? 64 : ptr_size ); dw = get_key_value( key, "Winetest", KEY_WOW64_32KEY ); todo_wine_if (ptr_size != 32) - ok( dw == 32, "wrong value %u\n", dw ); + ok( dw == 32, "wrong value %lu\n", dw ); RegCloseKey( key ); if (ptr_size == 32) { err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_64KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); dw = get_key_value( key, "Winetest", 0 ); - ok( dw == 64 || broken(dw == 32) /* xp64 */, "wrong value %u\n", dw ); + ok( dw == 64 || broken(dw == 32) /* xp64 */, "wrong value %lu\n", dw ); check_key_value( key, "Winetest", KEY_WOW64_64KEY, 64 ); dw = get_key_value( key, "Winetest", KEY_WOW64_32KEY ); - todo_wine ok( dw == 32, "wrong value %u\n", dw ); + todo_wine ok( dw == 32, "wrong value %lu\n", dw ); RegCloseKey( key ); err = RegCreateKeyExA( HKEY_LOCAL_MACHINE, "Software\\Wine", 0, NULL, 0, KEY_WOW64_32KEY | KEY_ALL_ACCESS, NULL, &key, NULL ); - ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegCreateKeyExA failed: %lu\n", err ); check_key_value( key, "Winetest", 0, 32 ); check_key_value( key, "Winetest", KEY_WOW64_64KEY, is_vista ? 64 : 32 ); check_key_value( key, "Winetest", KEY_WOW64_32KEY, 32 ); @@ -2732,18 +2732,18 @@ static void test_redirection(void) if (pRegDeleteKeyExA) { err = pRegDeleteKeyExA( key32, "", KEY_WOW64_32KEY, 0 ); - ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %lu\n", err ); err = pRegDeleteKeyExA( key64, "", KEY_WOW64_64KEY, 0 ); - ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %lu\n", err ); pRegDeleteKeyExA( key64, "", KEY_WOW64_64KEY, 0 ); pRegDeleteKeyExA( root64, "", KEY_WOW64_64KEY, 0 ); } else { err = RegDeleteKeyA( key32, "" ); - ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %lu\n", err ); err = RegDeleteKeyA( key64, "" ); - ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %u\n", err ); + ok( err == ERROR_SUCCESS, "RegDeleteKey failed: %lu\n", err ); RegDeleteKeyA( key64, "" ); RegDeleteKeyA( root64, "" ); } @@ -2754,17 +2754,17 @@ static void test_redirection(void) /* open key in native bit mode */ err = RegOpenKeyExA(HKEY_CLASSES_ROOT, "Interface", 0, KEY_ALL_ACCESS, &native); - ok(err == ERROR_SUCCESS, "got %i\n", err); + ok(err == ERROR_SUCCESS, "got %li\n", err); pRegDeleteKeyExA(native, "AWineTest", 0, 0); /* write subkey in opposite bit mode */ err = RegOpenKeyExA(HKEY_CLASSES_ROOT, "Interface", 0, KEY_ALL_ACCESS | opposite, &op_key); - ok(err == ERROR_SUCCESS, "got %i\n", err); + ok(err == ERROR_SUCCESS, "got %li\n", err); err = RegCreateKeyExA(op_key, "AWineTest", 0, NULL, 0, KEY_ALL_ACCESS | opposite, NULL, &key, NULL); - ok(err == ERROR_SUCCESS || err == ERROR_ACCESS_DENIED, "got %i\n", err); + ok(err == ERROR_SUCCESS || err == ERROR_ACCESS_DENIED, "got %li\n", err); if(err != ERROR_SUCCESS){ win_skip("Can't write to registry\n"); RegCloseKey(op_key); @@ -2777,10 +2777,10 @@ static void test_redirection(void) err = RegOpenKeyExA(native, "AWineTest", 0, KEY_ALL_ACCESS, &key); ok(err == ERROR_FILE_NOT_FOUND || broken(err == ERROR_SUCCESS), /* before Win7, HKCR is reflected instead of redirected */ - "got %i\n", err); + "got %li\n", err); err = pRegDeleteKeyExA(op_key, "AWineTest", opposite, 0); - ok(err == ERROR_SUCCESS, "got %i\n", err); + ok(err == ERROR_SUCCESS, "got %li\n", err); RegCloseKey(op_key); RegCloseKey(native); @@ -2814,7 +2814,7 @@ static void test_classesroot(void) KEY_QUERY_VALUE|KEY_SET_VALUE, &hkcr ); todo_wine ok(res == ERROR_SUCCESS || broken(res == ERROR_FILE_NOT_FOUND /* WinNT */), - "test key not found in hkcr: %d\n", res); + "test key not found in hkcr: %ld\n", res); if (res) { skip("HKCR key merging not supported\n"); @@ -2827,38 +2827,38 @@ static void test_classesroot(void) /* set a value in user's classes */ res = RegSetValueExA(hkey, "val1", 0, REG_SZ, (const BYTE *)"user", sizeof("user")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* try to find the value in hkcr */ res = RegQueryValueExA(hkcr, "val1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); /* modify the value in hkcr */ res = RegSetValueExA(hkcr, "val1", 0, REG_SZ, (const BYTE *)"hkcr", sizeof("hkcr")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check if the value is also modified in user's classes */ res = RegQueryValueExA(hkey, "val1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); /* set a value in hkcr */ res = RegSetValueExA(hkcr, "val0", 0, REG_SZ, (const BYTE *)"hkcr", sizeof("hkcr")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* try to find the value in user's classes */ res = RegQueryValueExA(hkey, "val0", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); /* modify the value in user's classes */ res = RegSetValueExA(hkey, "val0", 0, REG_SZ, (const BYTE *)"user", sizeof("user")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check if the value is also modified in hkcr */ res = RegQueryValueExA(hkcr, "val0", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); /* cleanup */ @@ -2886,7 +2886,7 @@ static void test_classesroot(void) res = RegOpenKeyExA( HKEY_CLASSES_ROOT, "WineTestCls", 0, KEY_QUERY_VALUE|KEY_SET_VALUE, &hkcr ); ok(res == ERROR_SUCCESS, - "test key not found in hkcr: %d\n", res); + "test key not found in hkcr: %ld\n", res); ok(IS_HKCR(hkcr), "hkcr mask not set in %p\n", hkcr); if (res) { @@ -2897,20 +2897,20 @@ static void test_classesroot(void) /* set a value in hklm classes */ res = RegSetValueExA(hklm, "val2", 0, REG_SZ, (const BYTE *)"hklm", sizeof("hklm")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* try to find the value in hkcr */ res = RegQueryValueExA(hkcr, "val2", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "hklm" ), "value set to '%s'\n", buffer ); /* modify the value in hkcr */ res = RegSetValueExA(hkcr, "val2", 0, REG_SZ, (const BYTE *)"hkcr", sizeof("hkcr")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check that the value is modified in hklm classes */ res = RegQueryValueExA(hklm, "val2", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); if (RegCreateKeyExA( HKEY_CURRENT_USER, "Software\\Classes\\WineTestCls", 0, NULL, 0, @@ -2921,40 +2921,40 @@ static void test_classesroot(void) res = RegOpenKeyExA( HKEY_CLASSES_ROOT, "WineTestCls", 0, KEY_QUERY_VALUE|KEY_SET_VALUE, &hkcr ); ok(res == ERROR_SUCCESS, - "test key not found in hkcr: %d\n", res); + "test key not found in hkcr: %ld\n", res); ok(IS_HKCR(hkcr), "hkcr mask not set in %p\n", hkcr); /* set a value in user's classes */ res = RegSetValueExA(hkey, "val2", 0, REG_SZ, (const BYTE *)"user", sizeof("user")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* try to find the value in hkcr */ res = RegQueryValueExA(hkcr, "val2", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); /* modify the value in hklm */ res = RegSetValueExA(hklm, "val2", 0, REG_SZ, (const BYTE *)"hklm", sizeof("hklm")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check that the value is not overwritten in hkcr or user's classes */ res = RegQueryValueExA(hkcr, "val2", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); res = RegQueryValueExA(hkey, "val2", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); /* modify the value in hkcr */ res = RegSetValueExA(hkcr, "val2", 0, REG_SZ, (const BYTE *)"hkcr", sizeof("hkcr")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check that the value is overwritten in hklm and user's classes */ res = RegQueryValueExA(hkcr, "val2", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); res = RegQueryValueExA(hkey, "val2", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); /* create a subkey in hklm */ @@ -2963,25 +2963,25 @@ static void test_classesroot(void) ok(!IS_HKCR(hklmsub1), "hkcr mask set in %p\n", hklmsub1); /* try to open that subkey in hkcr */ res = RegOpenKeyExA( hkcr, "subkey1", 0, KEY_QUERY_VALUE|KEY_SET_VALUE, &hkcrsub1 ); - ok(res == ERROR_SUCCESS, "test key not found in hkcr: %d\n", res); + ok(res == ERROR_SUCCESS, "test key not found in hkcr: %ld\n", res); ok(IS_HKCR(hkcrsub1), "hkcr mask not set in %p\n", hkcrsub1); /* set a value in hklm classes */ res = RegSetValueExA(hklmsub1, "subval1", 0, REG_SZ, (const BYTE *)"hklm", sizeof("hklm")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* try to find the value in hkcr */ res = RegQueryValueExA(hkcrsub1, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "hklm" ), "value set to '%s'\n", buffer ); /* modify the value in hkcr */ res = RegSetValueExA(hkcrsub1, "subval1", 0, REG_SZ, (const BYTE *)"hkcr", sizeof("hkcr")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check that the value is modified in hklm classes */ res = RegQueryValueExA(hklmsub1, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); /* create a subkey in user's classes */ @@ -2991,35 +2991,35 @@ static void test_classesroot(void) /* set a value in user's classes */ res = RegSetValueExA(hkeysub1, "subval1", 0, REG_SZ, (const BYTE *)"user", sizeof("user")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* try to find the value in hkcr */ res = RegQueryValueExA(hkcrsub1, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); /* modify the value in hklm */ res = RegSetValueExA(hklmsub1, "subval1", 0, REG_SZ, (const BYTE *)"hklm", sizeof("hklm")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check that the value is not overwritten in hkcr or user's classes */ res = RegQueryValueExA(hkcrsub1, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); res = RegQueryValueExA(hkeysub1, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "user" ), "value set to '%s'\n", buffer ); /* modify the value in hkcr */ res = RegSetValueExA(hkcrsub1, "subval1", 0, REG_SZ, (const BYTE *)"hkcr", sizeof("hkcr")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* check that the value is not overwritten in hklm, but in user's classes */ res = RegQueryValueExA(hklmsub1, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "hklm" ), "value set to '%s'\n", buffer ); res = RegQueryValueExA(hkeysub1, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); /* new subkey in hkcr */ @@ -3027,19 +3027,19 @@ static void test_classesroot(void) KEY_QUERY_VALUE|KEY_SET_VALUE, NULL, &hkcrsub2, NULL )) return; ok(IS_HKCR(hkcrsub2), "hkcr mask not set in %p\n", hkcrsub2); res = RegSetValueExA(hkcrsub2, "subval1", 0, REG_SZ, (const BYTE *)"hkcr", sizeof("hkcr")); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d, GLE=%x\n", res, GetLastError()); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld, GLE=%lx\n", res, GetLastError()); /* try to open that new subkey in user's classes and hklm */ res = RegOpenKeyExA( hkey, "subkey2", 0, KEY_QUERY_VALUE|KEY_SET_VALUE, &hklmsub2 ); - ok(res != ERROR_SUCCESS, "test key found in user's classes: %d\n", res); + ok(res != ERROR_SUCCESS, "test key found in user's classes: %ld\n", res); hklmsub2 = 0; res = RegOpenKeyExA( hklm, "subkey2", 0, KEY_QUERY_VALUE|KEY_SET_VALUE, &hklmsub2 ); - ok(res == ERROR_SUCCESS, "test key not found in hklm: %d\n", res); + ok(res == ERROR_SUCCESS, "test key not found in hklm: %ld\n", res); ok(!IS_HKCR(hklmsub2), "hkcr mask set in %p\n", hklmsub2); /* check that the value is present in hklm */ res = RegQueryValueExA(hklmsub2, "subval1", NULL, &type, (LPBYTE)buffer, &size); - ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegQueryValueExA failed: %ld\n", res); ok(!strcmp( buffer, "hkcr" ), "value set to '%s'\n", buffer ); /* cleanup */ @@ -3048,23 +3048,23 @@ static void test_classesroot(void) /* delete subkey1 from hkcr (should point at user's classes) */ res = RegDeleteKeyA(hkcr, "subkey1"); - ok(res == ERROR_SUCCESS, "RegDeleteKey failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegDeleteKey failed: %ld\n", res); /* confirm key was removed in hkey but not hklm */ res = RegOpenKeyExA(hkey, "subkey1", 0, KEY_READ, &hkeysub1); - ok(res == ERROR_FILE_NOT_FOUND, "test key found in user's classes: %d\n", res); + ok(res == ERROR_FILE_NOT_FOUND, "test key found in user's classes: %ld\n", res); res = RegOpenKeyExA(hklm, "subkey1", 0, KEY_READ, &hklmsub1); - ok(res == ERROR_SUCCESS, "test key not found in hklm: %d\n", res); + ok(res == ERROR_SUCCESS, "test key not found in hklm: %ld\n", res); ok(!IS_HKCR(hklmsub1), "hkcr mask set in %p\n", hklmsub1); /* delete subkey1 from hkcr again (which should now point at hklm) */ res = RegDeleteKeyA(hkcr, "subkey1"); - ok(res == ERROR_SUCCESS, "RegDeleteKey failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegDeleteKey failed: %ld\n", res); /* confirm hkey was removed in hklm */ RegCloseKey( hklmsub1 ); res = RegOpenKeyExA(hklm, "subkey1", 0, KEY_READ, &hklmsub1); - ok(res == ERROR_FILE_NOT_FOUND, "test key found in hklm: %d\n", res); + ok(res == ERROR_FILE_NOT_FOUND, "test key found in hklm: %ld\n", res); /* final cleanup */ delete_key( hkey ); @@ -3110,7 +3110,7 @@ static void test_classesroot_enum(void) res = RegOpenKeyA( HKEY_CLASSES_ROOT, "WineTestCls", &hkcr ); todo_wine ok(res == ERROR_SUCCESS || broken(res == ERROR_FILE_NOT_FOUND /* WinNT */), - "test key not found in hkcr: %d\n", res); + "test key not found in hkcr: %ld\n", res); if (res) { skip("HKCR key merging not supported\n"); @@ -3120,35 +3120,35 @@ static void test_classesroot_enum(void) } res = RegSetValueExA( hkcu, "X", 0, REG_SZ, (const BYTE *) "AA", 3 ); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld\n", res); res = RegSetValueExA( hkcu, "Y", 0, REG_SZ, (const BYTE *) "B", 2 ); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld\n", res); res = RegCreateKeyA( hkcu, "A", &hkcusub[0] ); - ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %ld\n", res); res = RegCreateKeyA( hkcu, "B", &hkcusub[1] ); - ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %ld\n", res); /* test on values in HKCU */ size = sizeof(buffer); res = RegEnumValueA( hkcr, 0, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", res ); ok(!strcmp( buffer, "X" ), "expected 'X', got '%s'\n", buffer); size = sizeof(buffer); res = RegEnumValueA( hkcr, 1, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", res ); ok(!strcmp( buffer, "Y" ), "expected 'Y', got '%s'\n", buffer); size = sizeof(buffer); res = RegEnumValueA( hkcr, 2, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n", res ); + ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n", res ); res = RegEnumKeyA( hkcr, 0, buffer, size ); - ok(res == ERROR_SUCCESS, "RegEnumKey failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumKey failed: %ld\n", res ); ok(!strcmp( buffer, "A" ), "expected 'A', got '%s'\n", buffer); res = RegEnumKeyA( hkcr, 1, buffer, size ); - ok(res == ERROR_SUCCESS, "RegEnumKey failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumKey failed: %ld\n", res ); ok(!strcmp( buffer, "B" ), "expected 'B', got '%s'\n", buffer); res = RegEnumKeyA( hkcr, 2, buffer, size ); - ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n", res ); + ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n", res ); /* prepare test env in HKLM */ if (!RegOpenKeyA( HKEY_LOCAL_MACHINE, "Software\\Classes\\WineTestCls", &hklm )) @@ -3172,42 +3172,42 @@ static void test_classesroot_enum(void) } res = RegSetValueExA( hklm, "X", 0, REG_SZ, (const BYTE *) "AB", 3 ); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld\n", res); res = RegSetValueExA( hklm, "Z", 0, REG_SZ, (const BYTE *) "C", 2 ); - ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegSetValueExA failed: %ld\n", res); res = RegCreateKeyA( hklm, "A", &hklmsub[0] ); - ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %ld\n", res); res = RegCreateKeyA( hklm, "C", &hklmsub[1] ); - ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegCreateKeyA failed: %ld\n", res); /* test on values/keys in both HKCU and HKLM */ size = sizeof(buffer); res = RegEnumValueA( hkcr, 0, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", res ); ok(!strcmp( buffer, "X" ), "expected 'X', got '%s'\n", buffer); size = sizeof(buffer); res = RegEnumValueA( hkcr, 1, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", res ); ok(!strcmp( buffer, "Y" ), "expected 'Y', got '%s'\n", buffer); size = sizeof(buffer); res = RegEnumValueA( hkcr, 2, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", res ); ok(!strcmp( buffer, "Z" ), "expected 'Z', got '%s'\n", buffer); size = sizeof(buffer); res = RegEnumValueA( hkcr, 3, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n", res ); + ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n", res ); res = RegEnumKeyA( hkcr, 0, buffer, size ); - ok(res == ERROR_SUCCESS, "RegEnumKey failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumKey failed: %ld\n", res ); ok(!strcmp( buffer, "A" ), "expected 'A', got '%s'\n", buffer); res = RegEnumKeyA( hkcr, 1, buffer, size ); - ok(res == ERROR_SUCCESS, "RegEnumKey failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumKey failed: %ld\n", res ); ok(!strcmp( buffer, "B" ), "expected 'B', got '%s'\n", buffer); res = RegEnumKeyA( hkcr, 2, buffer, size ); - ok(res == ERROR_SUCCESS, "RegEnumKey failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumKey failed: %ld\n", res ); ok(!strcmp( buffer, "C" ), "expected 'C', got '%s'\n", buffer); res = RegEnumKeyA( hkcr, 3, buffer, size ); - ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n", res ); + ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n", res ); /* delete values/keys from HKCU to test only on HKLM */ RegCloseKey( hkcusub[0] ); @@ -3219,40 +3219,40 @@ static void test_classesroot_enum(void) res = RegEnumValueA( hkcr, 0, buffer, &size, NULL, NULL, NULL, NULL ); ok(res == ERROR_KEY_DELETED || res == ERROR_NO_SYSTEM_RESOURCES, /* Windows XP */ - "expected ERROR_KEY_DELETED, got %d\n", res); + "expected ERROR_KEY_DELETED, got %ld\n", res); size = sizeof(buffer); res = RegEnumKeyA( hkcr, 0, buffer, size ); ok(res == ERROR_KEY_DELETED || res == ERROR_NO_SYSTEM_RESOURCES, /* Windows XP */ - "expected ERROR_KEY_DELETED, got %d\n", res); + "expected ERROR_KEY_DELETED, got %ld\n", res); /* reopen HKCR handle */ RegCloseKey( hkcr ); res = RegOpenKeyA( HKEY_CLASSES_ROOT, "WineTestCls", &hkcr ); - ok(res == ERROR_SUCCESS, "test key not found in hkcr: %d\n", res); + ok(res == ERROR_SUCCESS, "test key not found in hkcr: %ld\n", res); if (res) goto cleanup; /* test on values/keys in HKLM */ size = sizeof(buffer); res = RegEnumValueA( hkcr, 0, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", res ); ok(!strcmp( buffer, "X" ), "expected 'X', got '%s'\n", buffer); size = sizeof(buffer); res = RegEnumValueA( hkcr, 1, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumValueA failed: %ld\n", res ); ok(!strcmp( buffer, "Z" ), "expected 'Z', got '%s'\n", buffer); size = sizeof(buffer); res = RegEnumValueA( hkcr, 2, buffer, &size, NULL, NULL, NULL, NULL ); - ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n", res ); + ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n", res ); res = RegEnumKeyA( hkcr, 0, buffer, size ); - ok(res == ERROR_SUCCESS, "RegEnumKey failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumKey failed: %ld\n", res ); ok(!strcmp( buffer, "A" ), "expected 'A', got '%s'\n", buffer); res = RegEnumKeyA( hkcr, 1, buffer, size ); - ok(res == ERROR_SUCCESS, "RegEnumKey failed: %d\n", res ); + ok(res == ERROR_SUCCESS, "RegEnumKey failed: %ld\n", res ); ok(!strcmp( buffer, "C" ), "expected 'C', got '%s'\n", buffer); res = RegEnumKeyA( hkcr, 2, buffer, size ); - ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n", res ); + ok(res == ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n", res ); cleanup: RegCloseKey( hklmsub[0] ); @@ -3268,28 +3268,28 @@ static void test_classesroot_mask(void) LSTATUS res; res = RegOpenKeyA( HKEY_CLASSES_ROOT, "CLSID", &hkey ); - ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %ld\n", res); todo_wine ok(IS_HKCR(hkey) || broken(!IS_HKCR(hkey)) /* WinNT */, "hkcr mask not set in %p\n", hkey); RegCloseKey( hkey ); res = RegOpenKeyA( HKEY_CURRENT_USER, "Software", &hkey ); - ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %ld\n", res); ok(!IS_HKCR(hkey), "hkcr mask set in %p\n", hkey); RegCloseKey( hkey ); res = RegOpenKeyA( HKEY_LOCAL_MACHINE, "Software", &hkey ); - ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %ld\n", res); ok(!IS_HKCR(hkey), "hkcr mask set in %p\n", hkey); RegCloseKey( hkey ); res = RegOpenKeyA( HKEY_USERS, ".Default", &hkey ); - ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %ld\n", res); ok(!IS_HKCR(hkey), "hkcr mask set in %p\n", hkey); RegCloseKey( hkey ); res = RegOpenKeyA( HKEY_CURRENT_CONFIG, "Software", &hkey ); - ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %d\n", res); + ok(res == ERROR_SUCCESS, "RegOpenKeyA failed: %ld\n", res); ok(!IS_HKCR(hkey), "hkcr mask set in %p\n", hkey); RegCloseKey( hkey ); } @@ -3309,31 +3309,31 @@ static void test_deleted_key(void) val_count = sizeof(value); type = 0; res = RegEnumValueA( hkey, 0, value, &val_count, NULL, &type, 0, 0 ); - ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %i\n", res); + ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %li\n", res); res = RegEnumKeyA( hkey, 0, value, sizeof(value) ); - ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %i\n", res); + ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %li\n", res); val_count = sizeof(value); type = 0; res = RegQueryValueExA( hkey, "test", NULL, &type, (BYTE *)value, &val_count ); - ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %i\n", res); + ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %li\n", res); res = RegSetValueExA( hkey, "test", 0, REG_SZ, (const BYTE*)"value", 6); - ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %i\n", res); + ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %li\n", res); res = RegOpenKeyA( hkey, "test", &hkey2 ); - ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %i\n", res); + ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %li\n", res); if (res == 0) RegCloseKey( hkey2 ); res = RegCreateKeyA( hkey, "test", &hkey2 ); - ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %i\n", res); + ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %li\n", res); if (res == 0) RegCloseKey( hkey2 ); res = RegFlushKey( hkey ); - ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %i\n", res); + ok(res == ERROR_KEY_DELETED, "expect ERROR_KEY_DELETED, got %li\n", res); RegCloseKey( hkey ); @@ -3346,38 +3346,38 @@ static void test_delete_value(void) char longname[401]; res = RegSetValueExA( hkey_main, "test", 0, REG_SZ, (const BYTE*)"value", 6 ); - ok(res == ERROR_SUCCESS, "expect ERROR_SUCCESS, got %i\n", res); + ok(res == ERROR_SUCCESS, "expect ERROR_SUCCESS, got %li\n", res); res = RegQueryValueExA( hkey_main, "test", NULL, NULL, NULL, NULL); - ok(res == ERROR_SUCCESS, "expect ERROR_SUCCESS, got %i\n", res); + ok(res == ERROR_SUCCESS, "expect ERROR_SUCCESS, got %li\n", res); res = RegDeleteValueA( hkey_main, "test" ); - ok(res == ERROR_SUCCESS, "expect ERROR_SUCCESS, got %i\n", res); + ok(res == ERROR_SUCCESS, "expect ERROR_SUCCESS, got %li\n", res); res = RegQueryValueExA( hkey_main, "test", NULL, NULL, NULL, NULL); - ok(res == ERROR_FILE_NOT_FOUND, "expect ERROR_FILE_NOT_FOUND, got %i\n", res); + ok(res == ERROR_FILE_NOT_FOUND, "expect ERROR_FILE_NOT_FOUND, got %li\n", res); res = RegDeleteValueA( hkey_main, "test" ); - ok(res == ERROR_FILE_NOT_FOUND, "expect ERROR_FILE_NOT_FOUND, got %i\n", res); + ok(res == ERROR_FILE_NOT_FOUND, "expect ERROR_FILE_NOT_FOUND, got %li\n", res); memset(longname, 'a', 400); longname[400] = 0; res = RegDeleteValueA( hkey_main, longname ); ok(res == ERROR_FILE_NOT_FOUND || broken(res == ERROR_MORE_DATA), /* nt4, win2k */ - "expect ERROR_FILE_NOT_FOUND, got %i\n", res); + "expect ERROR_FILE_NOT_FOUND, got %li\n", res); /* Default registry value */ res = RegSetValueExA(hkey_main, "", 0, REG_SZ, (const BYTE *)"value", 6); - ok(res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res); + ok(res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res); res = RegQueryValueExA(hkey_main, "", NULL, NULL, NULL, NULL); - ok(res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res); + ok(res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res); res = RegDeleteValueA(hkey_main, "" ); - ok(res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", res); + ok(res == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", res); res = RegQueryValueExA(hkey_main, "", NULL, NULL, NULL, NULL); - ok(res == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n", res); + ok(res == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n", res); } static void test_delete_key_value(void) @@ -3392,52 +3392,52 @@ static void test_delete_key_value(void) } ret = pRegDeleteKeyValueA(NULL, NULL, NULL); - ok(ret == ERROR_INVALID_HANDLE, "got %d\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %ld\n", ret); ret = pRegDeleteKeyValueA(hkey_main, NULL, NULL); - ok(ret == ERROR_FILE_NOT_FOUND, "got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "got %ld\n", ret); ret = RegSetValueExA(hkey_main, "test", 0, REG_SZ, (const BYTE*)"value", 6); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = RegQueryValueExA(hkey_main, "test", NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); /* NULL subkey name means delete from open key */ ret = pRegDeleteKeyValueA(hkey_main, NULL, "test"); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = RegQueryValueExA(hkey_main, "test", NULL, NULL, NULL, NULL); - ok(ret == ERROR_FILE_NOT_FOUND, "got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "got %ld\n", ret); /* now with real subkey */ ret = RegCreateKeyExA(hkey_main, "Subkey1", 0, NULL, 0, KEY_WRITE|KEY_READ, NULL, &subkey, NULL); - ok(!ret, "failed with error %d\n", ret); + ok(!ret, "failed with error %ld\n", ret); ret = RegSetValueExA(subkey, "test", 0, REG_SZ, (const BYTE*)"value", 6); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = RegQueryValueExA(subkey, "test", NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = pRegDeleteKeyValueA(hkey_main, "Subkey1", "test"); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ret = RegQueryValueExA(subkey, "test", NULL, NULL, NULL, NULL); - ok(ret == ERROR_FILE_NOT_FOUND, "got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "got %ld\n", ret); /* Default registry value */ ret = RegSetValueExA(subkey, "", 0, REG_SZ, (const BYTE *)"value", 6); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ret = RegQueryValueExA(subkey, "", NULL, NULL, NULL, NULL); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ret = pRegDeleteKeyValueA(hkey_main, "Subkey1", "" ); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ret = RegQueryValueExA(subkey, "", NULL, NULL, NULL, NULL); - ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n", ret); RegDeleteKeyA(subkey, ""); RegCloseKey(subkey); @@ -3450,7 +3450,7 @@ static void test_RegOpenCurrentUser(void) key = HKEY_CURRENT_USER; ret = RegOpenCurrentUser(KEY_READ, &key); - ok(!ret, "got %d, error %d\n", ret, GetLastError()); + ok(!ret, "got %ld, error %ld\n", ret, GetLastError()); ok(key != HKEY_CURRENT_USER, "got %p\n", key); RegCloseKey(key); } @@ -3468,7 +3468,7 @@ static DWORD WINAPI notify_change_thread(void *arg) ret = RegNotifyChangeKeyValue(data->key, TRUE, REG_NOTIFY_CHANGE_NAME|data->flags, data->event, TRUE); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); return 0; } @@ -3482,56 +3482,56 @@ static void test_RegNotifyChangeKeyValue(void) LONG ret; event = CreateEventW(NULL, FALSE, TRUE, NULL); - ok(event != NULL, "CreateEvent failed, error %u\n", GetLastError()); + ok(event != NULL, "CreateEvent failed, error %lu\n", GetLastError()); ret = RegCreateKeyA(hkey_main, "TestKey", &key); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ret = RegNotifyChangeKeyValue(key, TRUE, REG_NOTIFY_CHANGE_NAME|REG_NOTIFY_CHANGE_LAST_SET, event, TRUE); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %u\n", dwret); + ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %lu\n", dwret); ret = RegCreateKeyA(key, "SubKey", &subkey); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %u\n", dwret); + ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %lu\n", dwret); /* watching deeper keys */ ret = RegNotifyChangeKeyValue(key, TRUE, REG_NOTIFY_CHANGE_NAME|REG_NOTIFY_CHANGE_LAST_SET, event, TRUE); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %u\n", dwret); + ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %lu\n", dwret); ret = RegCreateKeyA(subkey, "SubKey", &subsubkey); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %u\n", dwret); + ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %lu\n", dwret); /* watching deeper values */ ret = RegNotifyChangeKeyValue(key, TRUE, REG_NOTIFY_CHANGE_NAME|REG_NOTIFY_CHANGE_LAST_SET, event, TRUE); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %u\n", dwret); + ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %lu\n", dwret); ret = RegSetValueA(subsubkey, NULL, REG_SZ, "SubSubKeyValue", 0); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %u\n", dwret); + ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %lu\n", dwret); /* don't watch deeper values */ RegCloseKey(key); ret = RegOpenKeyA(hkey_main, "TestKey", &key); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ret = RegNotifyChangeKeyValue(key, FALSE, REG_NOTIFY_CHANGE_NAME|REG_NOTIFY_CHANGE_LAST_SET, event, TRUE); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %u\n", dwret); + ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %lu\n", dwret); ret = RegSetValueA(subsubkey, NULL, REG_SZ, "SubSubKeyValueNEW", 0); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %u\n", dwret); + ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %lu\n", dwret); RegDeleteKeyA(subkey, "SubKey"); RegDeleteKeyA(key, "SubKey"); @@ -3541,7 +3541,7 @@ static void test_RegNotifyChangeKeyValue(void) /* test same thread with REG_NOTIFY_THREAD_AGNOSTIC */ ret = RegOpenKeyA(hkey_main, "TestKey", &key); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); ret = RegNotifyChangeKeyValue(key, TRUE, REG_NOTIFY_CHANGE_NAME|REG_NOTIFY_THREAD_AGNOSTIC, event, TRUE); if (ret == ERROR_INVALID_PARAMETER) @@ -3553,9 +3553,9 @@ static void test_RegNotifyChangeKeyValue(void) } ret = RegCreateKeyA(key, "SubKey", &subkey); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %u\n", dwret); + ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %lu\n", dwret); RegDeleteKeyA(key, "SubKey"); RegCloseKey(subkey); @@ -3563,7 +3563,7 @@ static void test_RegNotifyChangeKeyValue(void) /* test different thread without REG_NOTIFY_THREAD_AGNOSTIC */ ret = RegOpenKeyA(hkey_main, "TestKey", &key); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); data.key = key; data.flags = 0; @@ -3577,12 +3577,12 @@ static void test_RegNotifyChangeKeyValue(void) Wine already behaves as if the flag is set */ dwret = WaitForSingleObject(event, 0); todo_wine - ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %u\n", dwret); + ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %lu\n", dwret); RegCloseKey(key); /* test different thread with REG_NOTIFY_THREAD_AGNOSTIC */ ret = RegOpenKeyA(hkey_main, "TestKey", &key); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); data.flags = REG_NOTIFY_THREAD_AGNOSTIC; thread = CreateThread(NULL, 0, notify_change_thread, &data, 0, NULL); @@ -3590,13 +3590,13 @@ static void test_RegNotifyChangeKeyValue(void) CloseHandle(thread); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %u\n", dwret); + ok(dwret == WAIT_TIMEOUT, "expected WAIT_TIMEOUT, got %lu\n", dwret); ret = RegCreateKeyA(key, "SubKey", &subkey); - ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %d\n", ret); + ok(ret == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %ld\n", ret); dwret = WaitForSingleObject(event, 0); - ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %u\n", dwret); + ok(dwret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %lu\n", dwret); RegDeleteKeyA(key, "SubKey"); RegDeleteKeyA(key, ""); @@ -3705,18 +3705,18 @@ static void test_performance_keys(void) size = 0; ret = RegQueryValueExA(keys[i], names[j], NULL, NULL, NULL, &size); - ok(ret == ERROR_MORE_DATA, "got %u\n", ret); - ok(!size, "got size %u\n", size); + ok(ret == ERROR_MORE_DATA, "got %lu\n", ret); + ok(!size, "got size %lu\n", size); size = 10; ret = RegQueryValueExA(keys[i], names[j], NULL, NULL, buffer, &size); - ok(ret == ERROR_MORE_DATA, "got %u\n", ret); + ok(ret == ERROR_MORE_DATA, "got %lu\n", ret); todo_wine - ok(size == 10, "got size %u\n", size); + ok(size == 10, "got size %lu\n", size); size = buffer_size; ret = RegQueryValueExA(keys[i], names[j], NULL, NULL, NULL, &size); - ok(ret == ERROR_MORE_DATA, "got %u\n", ret); + ok(ret == ERROR_MORE_DATA, "got %lu\n", ret); QueryPerformanceCounter(&perftime1); NtQuerySystemTime(&systime1); @@ -3724,9 +3724,9 @@ static void test_performance_keys(void) size = buffer_size; type = 0xdeadbeef; ret = RegQueryValueExA(keys[i], names[j], NULL, &type, buffer, &size); - ok(!ret, "got %u\n", ret); - ok(type == REG_BINARY, "got type %u\n", type); - ok(size >= sizeof(PERF_DATA_BLOCK) && size < buffer_size, "got size %u\n", size); + ok(!ret, "got %lu\n", ret); + ok(type == REG_BINARY, "got type %lu\n", type); + ok(size >= sizeof(PERF_DATA_BLOCK) && size < buffer_size, "got size %lu\n", size); QueryPerformanceCounter(&perftime2); NtQuerySystemTime(&systime2); @@ -3734,19 +3734,19 @@ static void test_performance_keys(void) data = buffer; ok(!wcsncmp(data->Signature, L"PERF", 4), "got signature %s\n", debugstr_wn(data->Signature, 4)); - ok(data->LittleEndian == 1, "got endianness %u\n", data->LittleEndian); - ok(data->Version == 1, "got version %u\n", data->Version); - ok(data->Revision == 1, "got version %u\n", data->Revision); - ok(data->TotalByteLength == size, "expected size %u, got %u\n", + ok(data->LittleEndian == 1, "got endianness %lu\n", data->LittleEndian); + ok(data->Version == 1, "got version %lu\n", data->Version); + ok(data->Revision == 1, "got version %lu\n", data->Revision); + ok(data->TotalByteLength == size, "expected size %lu, got %lu\n", size, data->TotalByteLength); expect_size = sizeof(PERF_DATA_BLOCK) + data->SystemNameLength; expect_size = (expect_size + 7) & ~7; - ok(data->HeaderLength == expect_size, "expected header size %u, got %u\n", + ok(data->HeaderLength == expect_size, "expected header size %lu, got %lu\n", expect_size, data->HeaderLength); /* todo: test objects... */ - todo_wine ok(data->DefaultObject == 238, "got default object %u\n", data->DefaultObject); + todo_wine ok(data->DefaultObject == 238, "got default object %lu\n", data->DefaultObject); ok(data->PerfTime.QuadPart >= perftime1.QuadPart && data->PerfTime.QuadPart <= perftime2.QuadPart, @@ -3764,10 +3764,10 @@ static void test_performance_keys(void) "got times %I64u, %I64u, %I64u\n", systime1.QuadPart, file_time.l, systime2.QuadPart); ok(data->SystemNameLength == (sysname_len + 1) * sizeof(WCHAR), - "expected name len %u, got %u\n", + "expected name len %Iu, got %lu\n", (sysname_len + 1) * sizeof(WCHAR), data->SystemNameLength); ok(data->SystemNameOffset == sizeof(PERF_DATA_BLOCK), - "got name offset %u\n", data->SystemNameOffset); + "got name offset %lu\n", data->SystemNameOffset); ok(!wcscmp(sysname, (const WCHAR *)(data + 1)), "expected name %s, got %s\n", debugstr_w(sysname), debugstr_w((const WCHAR *)(data + 1))); @@ -3778,40 +3778,40 @@ static void test_performance_keys(void) size = 0xdeadbeef; ret = RegQueryValueExA(keys[i], "cOuNtEr", NULL, NULL, NULL, &size); - ok(!ret, "got %u\n", ret); - ok(size > 0 && size < 0xdeadbeef, "got size %u\n", size); + ok(!ret, "got %lu\n", ret); + ok(size > 0 && size < 0xdeadbeef, "got size %lu\n", size); type = 0xdeadbeef; size = 0; ret = RegQueryValueExA(keys[i], "cOuNtEr", NULL, &type, buffer, &size); - ok(ret == ERROR_MORE_DATA, "got %u\n", ret); - ok(size > 0, "got size %u\n", size); + ok(ret == ERROR_MORE_DATA, "got %lu\n", ret); + ok(size > 0, "got size %lu\n", size); type = 0xdeadbeef; size = buffer_size; ret = RegQueryValueExA(keys[i], "cOuNtEr", NULL, &type, buffer, &size); - ok(!ret, "got %u\n", ret); - ok(type == REG_MULTI_SZ, "got type %u\n", type); + ok(!ret, "got %lu\n", ret); + ok(type == REG_MULTI_SZ, "got type %lu\n", type); test_counter_values(buffer, keys[i]); type = 0xdeadbeef; size = buffer_size; ret = RegQueryValueExA(keys[i], "cOuNtErwine", NULL, &type, buffer, &size); - ok(!ret, "got %u\n", ret); - ok(type == REG_MULTI_SZ, "got type %u\n", type); + ok(!ret, "got %lu\n", ret); + ok(type == REG_MULTI_SZ, "got type %lu\n", type); test_counter_values(buffer, keys[i]); size = 0; ret = RegQueryValueExW(keys[i], L"cOuNtEr", NULL, NULL, NULL, &size); - ok(!ret, "got %u\n", ret); - ok(size > 0, "got size %u\n", size); + ok(!ret, "got %lu\n", ret); + ok(size > 0, "got size %lu\n", size); bufferW = malloc(size); type = 0xdeadbeef; ret = RegQueryValueExW(keys[i], L"cOuNtEr", NULL, &type, bufferW, &size); - ok(!ret, "got %u\n", ret); - ok(type == REG_MULTI_SZ, "got type %u\n", type); + ok(!ret, "got %lu\n", ret); + ok(type == REG_MULTI_SZ, "got type %lu\n", type); WideCharToMultiByte(CP_ACP, 0, bufferW, size / sizeof(WCHAR), buffer, buffer_size, NULL, NULL); test_counter_values(buffer, keys[i]); @@ -3819,14 +3819,14 @@ static void test_performance_keys(void) size = 0xdeadbeef; ret = RegQueryValueExA(keys[i], "hElP", NULL, NULL, NULL, &size); - ok(!ret, "got %u\n", ret); - ok(size > 0 && size < 0xdeadbeef, "got size %u\n", size); + ok(!ret, "got %lu\n", ret); + ok(size > 0 && size < 0xdeadbeef, "got size %lu\n", size); type = 0xdeadbeef; size = 0; ret = RegQueryValueExA(keys[i], "hElP", NULL, &type, buffer, &size); - ok(ret == ERROR_MORE_DATA, "got %u\n", ret); - ok(size > 0, "got size %u\n", size); + ok(ret == ERROR_MORE_DATA, "got %lu\n", ret); + ok(size > 0, "got size %lu\n", size); type = 0xdeadbeef; size = buffer_size; @@ -3836,92 +3836,92 @@ static void test_performance_keys(void) type = 0xdeadbeef; size = buffer_size; ret = RegQueryValueExA(keys[i], "hElPwine", NULL, &type, buffer, &size); - ok(!ret, "got %u\n", ret); - ok(type == REG_MULTI_SZ, "got type %u\n", type); + ok(!ret, "got %lu\n", ret); + ok(type == REG_MULTI_SZ, "got type %lu\n", type); test_help_values(buffer, keys[i]); size = 0; ret = RegQueryValueExW(keys[i], L"hElP", NULL, NULL, NULL, &size); - ok(!ret, "got %u\n", ret); - ok(size > 0, "got size %u\n", size); + ok(!ret, "got %lu\n", ret); + ok(size > 0, "got size %lu\n", size); bufferW = malloc(size); type = 0xdeadbeef; ret = RegQueryValueExW(keys[i], L"hElP", NULL, &type, bufferW, &size); - ok(!ret, "got %u\n", ret); - ok(type == REG_MULTI_SZ, "got type %u\n", type); + ok(!ret, "got %lu\n", ret); + ok(type == REG_MULTI_SZ, "got type %lu\n", type); WideCharToMultiByte(CP_ACP, 0, bufferW, size / sizeof(WCHAR), buffer, buffer_size, NULL, NULL); test_help_values(buffer, keys[i]); /* test other registry APIs */ ret = RegOpenKeyA(keys[i], NULL, &key); - todo_wine ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + todo_wine ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); ret = RegOpenKeyA(keys[i], "Global", &key); - ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); ret = RegOpenKeyExA(keys[i], "Global", 0, KEY_READ, &key); - ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); size = 0; ret = RegQueryValueA(keys[i], "Global", NULL, (LONG *)&size); - ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); ret = RegSetValueA(keys[i], "Global", REG_SZ, "dummy", 5); - ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); key_count = 0x900ddeed; ret = RegQueryInfoKeyA(keys[i], NULL, NULL, NULL, &key_count, NULL, NULL, &value_count, NULL, NULL, NULL, NULL); - todo_wine ok(!ret, "got %u\n", ret); - todo_wine ok(!key_count, "got %u subkeys\n", key_count); - todo_wine ok(value_count == 2, "got %u values\n", value_count); + todo_wine ok(!ret, "got %lu\n", ret); + todo_wine ok(!key_count, "got %lu subkeys\n", key_count); + todo_wine ok(value_count == 2, "got %lu values\n", value_count); size = buffer_size; ret = RegEnumValueA(keys[i], 0, buffer, &size, NULL, NULL, NULL, NULL); - todo_wine ok(ret == ERROR_MORE_DATA, "got %u\n", ret); - ok(size == buffer_size, "got size %u\n", size); + todo_wine ok(ret == ERROR_MORE_DATA, "got %lu\n", ret); + ok(size == buffer_size, "got size %lu\n", size); ret = RegCloseKey(keys[i]); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); ret = RegCloseKey(keys[i]); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); winetest_pop_context(); } ret = RegSetValueExA(HKEY_PERFORMANCE_DATA, "Global", 0, REG_SZ, (const BYTE *)"dummy", 5); - ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); ret = RegSetValueExA(HKEY_PERFORMANCE_TEXT, "Global", 0, REG_SZ, (const BYTE *)"dummy", 5); - todo_wine ok(ret == ERROR_BADKEY, "got %u\n", ret); + todo_wine ok(ret == ERROR_BADKEY, "got %lu\n", ret); ret = RegSetValueExA(HKEY_PERFORMANCE_NLSTEXT, "Global", 0, REG_SZ, (const BYTE *)"dummy", 5); - todo_wine ok(ret == ERROR_BADKEY, "got %u\n", ret); + todo_wine ok(ret == ERROR_BADKEY, "got %lu\n", ret); if (pRegSetKeyValueW) { ret = pRegSetKeyValueW(HKEY_PERFORMANCE_DATA, NULL, L"Global", REG_SZ, L"dummy", 10); - ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); ret = pRegSetKeyValueW(HKEY_PERFORMANCE_TEXT, NULL, L"Global", REG_SZ, L"dummy", 10); - todo_wine ok(ret == ERROR_BADKEY, "got %u\n", ret); + todo_wine ok(ret == ERROR_BADKEY, "got %lu\n", ret); ret = pRegSetKeyValueW(HKEY_PERFORMANCE_NLSTEXT, NULL, L"Global", REG_SZ, L"dummy", 10); - todo_wine ok(ret == ERROR_BADKEY, "got %u\n", ret); + todo_wine ok(ret == ERROR_BADKEY, "got %lu\n", ret); } ret = RegEnumKeyA(HKEY_PERFORMANCE_DATA, 0, buffer, buffer_size); - ok(ret == ERROR_INVALID_HANDLE, "got %u\n", ret); + ok(ret == ERROR_INVALID_HANDLE, "got %lu\n", ret); ret = RegEnumKeyA(HKEY_PERFORMANCE_TEXT, 0, buffer, buffer_size); - todo_wine ok(ret == ERROR_NO_MORE_ITEMS, "got %u\n", ret); + todo_wine ok(ret == ERROR_NO_MORE_ITEMS, "got %lu\n", ret); ret = RegEnumKeyA(HKEY_PERFORMANCE_NLSTEXT, 0, buffer, buffer_size); - todo_wine ok(ret == ERROR_NO_MORE_ITEMS, "got %u\n", ret); + todo_wine ok(ret == ERROR_NO_MORE_ITEMS, "got %lu\n", ret); free(buffer); } @@ -3942,22 +3942,22 @@ static void test_perflib_key(void) ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Windows NT\\CurrentVersion\\Perflib", 0, KEY_READ, &perflib_key); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); ret = RegOpenKeyExA(perflib_key, "009", 0, KEY_READ, &key); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); /* English always returns TEXT; most other languages return NLSTEXT, but * some (e.g. Hindi) return TEXT */ ok(key == HKEY_PERFORMANCE_TEXT || key == HKEY_PERFORMANCE_NLSTEXT, "got key %p\n", key); ret = RegCloseKey(key); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); RtlInitUnicodeString(&string, L"009"); InitializeObjectAttributes(&attr, &string, OBJ_CASE_INSENSITIVE, perflib_key, NULL); ret = NtOpenKey((HANDLE *)&key, KEY_ALL_ACCESS, &attr); ok(ret == STATUS_PREDEFINED_HANDLE || ret == STATUS_ACCESS_DENIED - || ret == STATUS_SUCCESS /* Win < 7 */, "got %#x\n", ret); + || ret == STATUS_SUCCESS /* Win < 7 */, "got %#lx\n", ret); if (ret == STATUS_PREDEFINED_HANDLE) ok(!is_special_key(key), "expected a normal handle, got %p\n", key); else if (ret == STATUS_SUCCESS) @@ -3972,42 +3972,42 @@ static void test_perflib_key(void) buffer = malloc(buffer_size); ret = NtQueryKey(key, KeyFullInformation, buffer, buffer_size, &size); - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); ret = NtEnumerateKey(key, 0, KeyFullInformation, buffer, buffer_size, &size); - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); RtlInitUnicodeString(&string, L"counter"); ret = NtQueryValueKey(key, &string, KeyValuePartialInformation, buffer, buffer_size, &size); - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); ret = NtEnumerateValueKey(key, 0, KeyValuePartialInformation, buffer, buffer_size, &size); - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); ret = NtSetValueKey(key, &string, 0, REG_SZ, "test", 5); - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); ret = NtDeleteValueKey(key, &string); - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); ret = NtDeleteKey(key); - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); RtlInitUnicodeString(&string, L"subkey"); InitializeObjectAttributes(&attr, &string, OBJ_CASE_INSENSITIVE, key, NULL); ret = NtOpenKey((HANDLE *)&key2, KEY_READ, &attr); if (is_special_key(key)) - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); else ok(ret == STATUS_OBJECT_NAME_NOT_FOUND - || broken(ret == STATUS_INVALID_HANDLE) /* WoW64 */, "got %#x\n", ret); + || broken(ret == STATUS_INVALID_HANDLE) /* WoW64 */, "got %#lx\n", ret); ret = NtCreateKey((HANDLE *)&key2, KEY_ALL_ACCESS, &attr, 0, NULL, 0, NULL); if (is_special_key(key)) - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); else ok(!ret || broken(ret == STATUS_ACCESS_DENIED) /* w8adm */ - || broken(ret == STATUS_INVALID_HANDLE) /* WoW64 */, "got %#x\n", ret); + || broken(ret == STATUS_INVALID_HANDLE) /* WoW64 */, "got %#lx\n", ret); if (!ret) { NtDeleteKey(key2); @@ -4017,9 +4017,9 @@ static void test_perflib_key(void) /* it's a real handle, though */ ret = NtQueryObject(key, ObjectNameInformation, buffer, buffer_size, &size); if (is_special_key(key)) - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); else - ok(!ret, "got %#x\n", ret); + ok(!ret, "got %#lx\n", ret); if (!ret) { name_info = (OBJECT_NAME_INFORMATION *)buffer; @@ -4029,21 +4029,21 @@ static void test_perflib_key(void) ret = NtClose(key); if (is_special_key(key)) - ok(ret == STATUS_INVALID_HANDLE, "got %#x\n", ret); + ok(ret == STATUS_INVALID_HANDLE, "got %#lx\n", ret); else - ok(!ret, "got %#x\n", ret); + ok(!ret, "got %#lx\n", ret); for (l = 0; l < ARRAY_SIZE(knames); l++) { - winetest_push_context("%d", l); + winetest_push_context("%ld", l); todo_wine_if(l == 1) { ret = RegOpenKeyExA(perflib_key, knames[l], 0, KEY_READ, &key); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); if (is_special_key(key)) { size = buffer_size; ret = RegQueryValueExA(key, "counter", NULL, NULL, (BYTE *)buffer, &size); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); if (!ret) { char *str; @@ -4066,7 +4066,7 @@ static void test_perflib_key(void) } ret = RegCloseKey(key); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); } winetest_pop_context(); } @@ -4089,22 +4089,22 @@ static void test_perflib_key(void) size = buffer_size; ret = RegQueryValueExA(key, "counter", NULL, NULL, (BYTE *)buffer, &size); - todo_wine ok(ret == ERROR_FILE_NOT_FOUND, "got %u\n", ret); + todo_wine ok(ret == ERROR_FILE_NOT_FOUND, "got %lu\n", ret); ret = RegCloseKey(key); - todo_wine ok(!ret, "got %u\n", ret); + todo_wine ok(!ret, "got %lu\n", ret); } /* else some languages don't have their own key. The keys are not really * usable anyway so assume it does not really matter. */ ret = RegCloseKey(perflib_key); - ok(!ret, "got %u\n", ret); + ok(!ret, "got %lu\n", ret); RtlInitUnicodeString(&string, L"\\Registry\\PerfData"); InitializeObjectAttributes(&attr, &string, OBJ_CASE_INSENSITIVE, NULL, NULL); ret = NtOpenKey((HANDLE *)&key, KEY_READ, &attr); - ok(ret == STATUS_OBJECT_NAME_NOT_FOUND, "got %#x\n", ret); + ok(ret == STATUS_OBJECT_NAME_NOT_FOUND, "got %#lx\n", ret); free(buffer); } @@ -4161,11 +4161,11 @@ static void test_RegLoadMUIString(void) ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\UTC", 0, KEY_READ, &hkey); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); size = ARRAY_SIZE(buf); ret = RegQueryValueExA(hkey, tz_value, NULL, &type, (BYTE *)buf, &size); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ok(buf[0] == '@', "got %s\n", buf); /* setup MUI string for tests */ @@ -4197,48 +4197,48 @@ static void test_RegLoadMUIString(void) size = 0xdeadbeef; ret = pRegLoadMUIStringW(hkey, tz_valueW, NULL, 0, &size, 0, NULL); - ok(ret == ERROR_MORE_DATA, "got %d, expected ERROR_MORE_DATA\n", ret); - ok(size == text_size, "got %u, expected %u\n", size, text_size); + ok(ret == ERROR_MORE_DATA, "got %ld, expected ERROR_MORE_DATA\n", ret); + ok(size == text_size, "got %lu, expected %lu\n", size, text_size); memset(bufW, 0xff, sizeof(bufW)); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, sizeof(WCHAR)+1, &size, 0, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "got %d, expected ERROR_INVALID_PARAMETER\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "got %ld, expected ERROR_INVALID_PARAMETER\n", ret); ok(bufW[0] == 0xffff, "got 0x%04x, expected 0xffff\n", bufW[0]); size = 0xdeadbeef; memset(bufW, 0xff, sizeof(bufW)); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, sizeof(WCHAR)*2, &size, 0, NULL); - ok(ret == ERROR_MORE_DATA, "got %d, expected ERROR_MORE_DATA\n", ret); + ok(ret == ERROR_MORE_DATA, "got %ld, expected ERROR_MORE_DATA\n", ret); ok(size == text_size || broken(size == text_size + sizeof(WCHAR) /* vista */), - "got %u, expected %u\n", size, text_size); + "got %lu, expected %lu\n", size, text_size); ok(bufW[0] == 0xffff, "got 0x%04x, expected 0xffff\n", bufW[0]); memset(bufW, 0xff, sizeof(bufW)); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, sizeof(WCHAR)*2, &size, REG_MUI_STRING_TRUNCATE, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "got %d, expected ERROR_INVALID_PARAMETER\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "got %ld, expected ERROR_INVALID_PARAMETER\n", ret); ok(bufW[0] == 0xffff, "got 0x%04x, expected 0xffff\n", bufW[0]); memset(bufW, 0xff, sizeof(bufW)); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, sizeof(WCHAR)*2, NULL, 0xdeadbeef, NULL); - ok(ret == ERROR_INVALID_PARAMETER, "got %d, expected ERROR_INVALID_PARAMETER\n", ret); + ok(ret == ERROR_INVALID_PARAMETER, "got %ld, expected ERROR_INVALID_PARAMETER\n", ret); ok(bufW[0] == 0xffff, "got 0x%04x, expected 0xffff\n", bufW[0]); memset(bufW, 0xff, sizeof(bufW)); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, sizeof(WCHAR)*2, NULL, REG_MUI_STRING_TRUNCATE, NULL); - ok(ret == ERROR_SUCCESS, "got %d, expected ERROR_SUCCESS\n", ret); + ok(ret == ERROR_SUCCESS, "got %ld, expected ERROR_SUCCESS\n", ret); ok(bufW[0] == textW[0], "got 0x%04x, expected 0x%04x\n", bufW[0], textW[0]); ok(bufW[1] == 0, "got 0x%04x, expected nul\n", bufW[1]); size = 0xdeadbeef; memset(bufW, 0xff, sizeof(bufW)); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, ARRAY_SIZE(bufW), &size, 0, NULL); - ok(ret == ERROR_SUCCESS, "got %d, expected ERROR_SUCCESS\n", ret); - ok(size == text_size, "got %u, expected %u\n", size, text_size); + ok(ret == ERROR_SUCCESS, "got %ld, expected ERROR_SUCCESS\n", ret); + ok(size == text_size, "got %lu, expected %lu\n", size, text_size); ok(!memcmp(textW, bufW, size), "got %s, expected %s\n", wine_dbgstr_wn(bufW, size / sizeof(WCHAR)), wine_dbgstr_wn(textW, text_size / sizeof(WCHAR))); ret = pRegLoadMUIStringA(hkey, tz_value, buf, ARRAY_SIZE(buf), &size, 0, NULL); - ok(ret == ERROR_CALL_NOT_IMPLEMENTED, "got %d, expected ERROR_CALL_NOT_IMPLEMENTED\n", ret); + ok(ret == ERROR_CALL_NOT_IMPLEMENTED, "got %ld, expected ERROR_CALL_NOT_IMPLEMENTED\n", ret); /* change the current directory to other than system32 directory */ SetCurrentDirectoryA("\\"); @@ -4246,19 +4246,19 @@ static void test_RegLoadMUIString(void) size = 0xdeadbeef; memset(bufW, 0xff, sizeof(bufW)); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, ARRAY_SIZE(bufW), &size, 0, sysdirW); - ok(ret == ERROR_SUCCESS, "got %d, expected ERROR_SUCCESS\n", ret); - ok(size == text_size, "got %u, expected %u\n", size, text_size); + ok(ret == ERROR_SUCCESS, "got %ld, expected ERROR_SUCCESS\n", ret); + ok(size == text_size, "got %lu, expected %lu\n", size, text_size); ok(!memcmp(textW, bufW, size), "got %s, expected %s\n", wine_dbgstr_wn(bufW, size / sizeof(WCHAR)), wine_dbgstr_wn(textW, text_size / sizeof(WCHAR))); ret = pRegLoadMUIStringA(hkey, tz_value, buf, ARRAY_SIZE(buf), &size, 0, sysdir); - ok(ret == ERROR_CALL_NOT_IMPLEMENTED, "got %d, expected ERROR_CALL_NOT_IMPLEMENTED\n", ret); + ok(ret == ERROR_CALL_NOT_IMPLEMENTED, "got %ld, expected ERROR_CALL_NOT_IMPLEMENTED\n", ret); ret = pRegLoadMUIStringW(hkey, tz_valueW, bufW, ARRAY_SIZE(bufW), &size, 0, NULL); - ok(ret == ERROR_FILE_NOT_FOUND, "got %d, expected ERROR_FILE_NOT_FOUND\n", ret); + ok(ret == ERROR_FILE_NOT_FOUND, "got %ld, expected ERROR_FILE_NOT_FOUND\n", ret); ret = pRegLoadMUIStringA(hkey, tz_value, buf, ARRAY_SIZE(buf), &size, 0, NULL); - ok(ret == ERROR_CALL_NOT_IMPLEMENTED, "got %d, expected ERROR_CALL_NOT_IMPLEMENTED\n", ret); + ok(ret == ERROR_CALL_NOT_IMPLEMENTED, "got %ld, expected ERROR_CALL_NOT_IMPLEMENTED\n", ret); RegCloseKey(hkey); @@ -4280,7 +4280,7 @@ static void test_RegLoadMUIString(void) size = test_case[i].value ? strlen(test_case[i].value) + 1 : 0; ret = RegSetValueExA(hkey_main, tz_value, 0, test_case[i].type, (const BYTE *)test_case[i].value, size); - ok(ret == ERROR_SUCCESS, "[%2u] got %d\n", i, ret); + ok(ret == ERROR_SUCCESS, "[%2u] got %ld\n", i, ret); size = 0xdeadbeef; memset(bufW, 0xff, sizeof(bufW)); @@ -4290,10 +4290,10 @@ static void test_RegLoadMUIString(void) ok(ret == test_case[i].expected || broken(test_case[i].value[0] == '%' && ret == ERROR_SUCCESS /* vista */) || broken(test_case[i].broken_ret && ret == test_case[i].broken_ret /* vista */), - "[%2u] expected %d, got %d\n", i, test_case[i].expected, ret); + "[%2u] expected %ld, got %ld\n", i, test_case[i].expected, ret); if (ret == ERROR_SUCCESS && test_case[i].expected == ERROR_SUCCESS) { - ok(size == text_size, "[%2u] got %u, expected %u\n", i, size, text_size); + ok(size == text_size, "[%2u] got %lu, expected %lu\n", i, size, text_size); ok(!memcmp(bufW, textW, size), "[%2u] got %s, expected %s\n", i, wine_dbgstr_wn(bufW, size/sizeof(WCHAR)), wine_dbgstr_wn(textW, text_size/sizeof(WCHAR))); @@ -4338,29 +4338,29 @@ static void test_EnumDynamicTimeZoneInformation(void) SetLastError(0xdeadbeef); ret = pEnumDynamicTimeZoneInformation(0, NULL); gle = GetLastError(); - ok(gle == 0xdeadbeef, "got 0x%x\n", gle); - ok(ret == ERROR_INVALID_PARAMETER, "got %d\n", ret); + ok(gle == 0xdeadbeef, "got 0x%lx\n", gle); + ok(ret == ERROR_INVALID_PARAMETER, "got %ld\n", ret); memset(&bogus_dtzi, 0xcc, sizeof(bogus_dtzi)); memset(&dtzi, 0xcc, sizeof(dtzi)); SetLastError(0xdeadbeef); ret = pEnumDynamicTimeZoneInformation(-1, &dtzi); gle = GetLastError(); - ok(gle == 0xdeadbeef, "got 0x%x\n", gle); - ok(ret == ERROR_NO_MORE_ITEMS, "got %d\n", ret); + ok(gle == 0xdeadbeef, "got 0x%lx\n", gle); + ok(ret == ERROR_NO_MORE_ITEMS, "got %ld\n", ret); ok(!memcmp(&dtzi, &bogus_dtzi, sizeof(dtzi)), "mismatch\n"); status = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones", 0, KEY_ENUMERATE_SUB_KEYS|KEY_QUERY_VALUE, &key); - ok(status == ERROR_SUCCESS, "got %d\n", status); + ok(status == ERROR_SUCCESS, "got %ld\n", status); index = 0; while (!(status = RegEnumKeyW(key, index, keyname, ARRAY_SIZE(keyname)))) { winetest_push_context("%s" , wine_dbgstr_w(keyname)); subkey = NULL; status = RegOpenKeyExW(key, keyname, 0, KEY_QUERY_VALUE, &subkey); - ok(status == ERROR_SUCCESS, "got %d\n", status); + ok(status == ERROR_SUCCESS, "got %ld\n", status); memset(&dtzi, 0xcc, sizeof(dtzi)); SetLastError(0xdeadbeef); @@ -4370,8 +4370,8 @@ static void test_EnumDynamicTimeZoneInformation(void) ok(gle == ERROR_SUCCESS || gle == ERROR_RESOURCE_TYPE_NOT_FOUND /* Win10 1809 32-bit */ || gle == ERROR_MUI_FILE_NOT_FOUND /* Win10 1809 64-bit */, - "got 0x%x\n", gle); - ok(ret == ERROR_SUCCESS, "got %d\n", ret); + "got 0x%lx\n", gle); + ok(ret == ERROR_SUCCESS, "got %ld\n", ret); ok(!lstrcmpW(dtzi.TimeZoneKeyName, keyname), "expected %s, got %s\n", wine_dbgstr_w(keyname), wine_dbgstr_w(dtzi.TimeZoneKeyName)); @@ -4380,7 +4380,7 @@ static void test_EnumDynamicTimeZoneInformation(void) size = sizeof(name); memset(name, 0, sizeof(name)); status = pRegGetValueW(subkey, NULL, L"Std", RRF_RT_REG_SZ, NULL, name, &size); - ok(status == ERROR_SUCCESS, "status %d Std %s\n", status, + ok(status == ERROR_SUCCESS, "status %ld Std %s\n", status, wine_dbgstr_w(name)); ok(*name, "Std name is empty\n"); if (pRegLoadMUIStringW) @@ -4388,7 +4388,7 @@ static void test_EnumDynamicTimeZoneInformation(void) size = sizeof(name); memset(name, 0, sizeof(name)); status = pRegLoadMUIStringW(subkey, L"MUI_Std", name, size, &size, 0, sysdir); - ok(status == ERROR_SUCCESS, "status %d MUI_Std %s\n", + ok(status == ERROR_SUCCESS, "status %ld MUI_Std %s\n", status, wine_dbgstr_w(name)); ok(*name, "MUI_Std name is empty\n"); } @@ -4398,7 +4398,7 @@ static void test_EnumDynamicTimeZoneInformation(void) size = sizeof(name); memset(name, 0, sizeof(name)); status = pRegGetValueW(subkey, NULL, L"Dlt", RRF_RT_REG_SZ, NULL, name, &size); - ok(status == ERROR_SUCCESS, "status %d %s Dlt %s\n", + ok(status == ERROR_SUCCESS, "status %ld %s Dlt %s\n", status, wine_dbgstr_w(keyname), wine_dbgstr_w(name)); ok(*name, "Dlt name is empty\n"); if (pRegLoadMUIStringW) @@ -4406,7 +4406,7 @@ static void test_EnumDynamicTimeZoneInformation(void) size = sizeof(name); memset(name, 0, sizeof(name)); status = pRegLoadMUIStringW(subkey, L"MUI_Dlt", name, size, &size, 0, sysdir); - ok(status == ERROR_SUCCESS, "status %d %s MUI_Dlt %s\n", + ok(status == ERROR_SUCCESS, "status %ld %s MUI_Dlt %s\n", status, wine_dbgstr_w(keyname), wine_dbgstr_w(name)); ok(*name, "MUI_Dlt name is empty\n"); } @@ -4416,7 +4416,7 @@ static void test_EnumDynamicTimeZoneInformation(void) size = sizeof(name); memset(name, 0, sizeof(name)); status = pRegGetValueW(subkey, NULL, L"Display", RRF_RT_REG_SZ, NULL, name, &size); - ok(status == ERROR_SUCCESS, "status %d %s Display %s\n", + ok(status == ERROR_SUCCESS, "status %ld %s Display %s\n", status, wine_dbgstr_w(keyname), wine_dbgstr_w(name)); ok(*name, "Display name is empty\n"); if (pRegLoadMUIStringW) @@ -4428,7 +4428,7 @@ static void test_EnumDynamicTimeZoneInformation(void) ok((status == ERROR_SUCCESS && *name) || broken(status == ERROR_RESOURCE_TYPE_NOT_FOUND) /* Win10 1809 32-bit */ || broken(status == ERROR_MUI_FILE_NOT_FOUND) /* Win10 1809 64-bit */, - "status %d MUI_Display %s\n", status, wine_dbgstr_w(name)); + "status %ld MUI_Display %s\n", status, wine_dbgstr_w(name)); } } else @@ -4441,13 +4441,13 @@ static void test_EnumDynamicTimeZoneInformation(void) size = sizeof(tz_data); status = pRegGetValueW(key, keyname, L"TZI", RRF_RT_REG_BINARY, NULL, &tz_data, &size); - ok(status == ERROR_SUCCESS, "got %d\n", status); + ok(status == ERROR_SUCCESS, "got %ld\n", status); - ok(dtzi.Bias == tz_data.bias, "expected %d, got %d\n", + ok(dtzi.Bias == tz_data.bias, "expected %ld, got %ld\n", tz_data.bias, dtzi.Bias); - ok(dtzi.StandardBias == tz_data.std_bias, "expected %d, got %d\n", + ok(dtzi.StandardBias == tz_data.std_bias, "expected %ld, got %ld\n", tz_data.std_bias, dtzi.StandardBias); - ok(dtzi.DaylightBias == tz_data.dlt_bias, "expected %d, got %d\n", + ok(dtzi.DaylightBias == tz_data.dlt_bias, "expected %ld, got %ld\n", tz_data.dlt_bias, dtzi.DaylightBias); ok(!memcmp(&dtzi.StandardDate, &tz_data.std_date, sizeof(dtzi.StandardDate)), @@ -4462,14 +4462,14 @@ static void test_EnumDynamicTimeZoneInformation(void) RegCloseKey(subkey); index++; } - ok(status == ERROR_NO_MORE_ITEMS, "got %d\n", status); + ok(status == ERROR_NO_MORE_ITEMS, "got %ld\n", status); memset(&dtzi, 0xcc, sizeof(dtzi)); SetLastError(0xdeadbeef); ret = pEnumDynamicTimeZoneInformation(index, &dtzi); gle = GetLastError(); - ok(gle == 0xdeadbeef, "got 0x%x\n", gle); - ok(ret == ERROR_NO_MORE_ITEMS, "got %d\n", ret); + ok(gle == 0xdeadbeef, "got 0x%lx\n", gle); + ok(ret == ERROR_NO_MORE_ITEMS, "got %ld\n", ret); ok(!memcmp(&dtzi, &bogus_dtzi, sizeof(dtzi)), "mismatch\n"); RegCloseKey(key); diff --git a/dlls/advapi32/tests/security.c b/dlls/advapi32/tests/security.c index e0a86acd5df..135a45f7727 100644 --- a/dlls/advapi32/tests/security.c +++ b/dlls/advapi32/tests/security.c @@ -126,7 +126,7 @@ static const char* debugstr_sid(PSID sid) const char *res; if (!ConvertSidToStringSidA(sid, &sidstr)) - res = wine_dbg_sprintf("ConvertSidToStringSidA failed le=%u", GetLastError()); + res = wine_dbg_sprintf("ConvertSidToStringSidA failed le=%lu", GetLastError()); else { res = __wine_dbg_strdup(sidstr); @@ -193,7 +193,7 @@ static SECURITY_DESCRIPTOR* test_get_security_descriptor(HANDLE handle, int line ret = GetKernelObjectSecurity(handle, OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, NULL, 0, &needed); ok_(__FILE__, line)(!ret, "GetKernelObjectSecurity should fail\n"); - ok_(__FILE__, line)(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + ok_(__FILE__, line)(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); ok_(__FILE__, line)(needed != 0xdeadbeef, "GetKernelObjectSecurity should return required buffer length\n"); length = needed; @@ -203,8 +203,8 @@ static SECURITY_DESCRIPTOR* test_get_security_descriptor(HANDLE handle, int line SetLastError(0xdeadbeef); ret = GetKernelObjectSecurity(handle, OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, sd, length, &needed); - ok_(__FILE__, line)(ret, "GetKernelObjectSecurity error %d\n", GetLastError()); - ok_(__FILE__, line)(needed == length || needed == 0 /* file, pipe */, "GetKernelObjectSecurity should return %u instead of %u\n", length, needed); + ok_(__FILE__, line)(ret, "GetKernelObjectSecurity error %ld\n", GetLastError()); + ok_(__FILE__, line)(needed == length || needed == 0 /* file, pipe */, "GetKernelObjectSecurity should return %lu instead of %lu\n", length, needed); return sd; } @@ -218,7 +218,7 @@ static void test_owner_equal(HANDLE Handle, PSID expected, int line) queriedSD = test_get_security_descriptor( Handle, line ); res = GetSecurityDescriptorOwner(queriedSD, &owner, &owner_defaulted); - ok_(__FILE__, line)(res, "GetSecurityDescriptorOwner failed with error %d\n", GetLastError()); + ok_(__FILE__, line)(res, "GetSecurityDescriptorOwner failed with error %ld\n", GetLastError()); ok_(__FILE__, line)(EqualSid(owner, expected), "Owner SIDs are not equal %s != %s\n", debugstr_sid(owner), debugstr_sid(expected)); @@ -237,7 +237,7 @@ static void test_group_equal(HANDLE Handle, PSID expected, int line) queriedSD = test_get_security_descriptor( Handle, line ); res = GetSecurityDescriptorGroup(queriedSD, &group, &group_defaulted); - ok_(__FILE__, line)(res, "GetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok_(__FILE__, line)(res, "GetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); ok_(__FILE__, line)(EqualSid(group, expected), "Group SIDs are not equal %s != %s\n", debugstr_sid(group), debugstr_sid(expected)); @@ -321,45 +321,45 @@ static void test_ConvertStringSidToSid(void) if( GetLastError() == ERROR_CALL_NOT_IMPLEMENTED ) return; ok( GetLastError() == ERROR_INVALID_PARAMETER, - "expected GetLastError() is ERROR_INVALID_PARAMETER, got %d\n", + "expected GetLastError() is ERROR_INVALID_PARAMETER, got %ld\n", GetLastError() ); r = ConvertStringSidToSidA( refs[0].refStr, NULL ); ok( !r && GetLastError() == ERROR_INVALID_PARAMETER, - "expected GetLastError() is ERROR_INVALID_PARAMETER, got %d\n", + "expected GetLastError() is ERROR_INVALID_PARAMETER, got %ld\n", GetLastError() ); r = ConvertStringSidToSidA( NULL, &psid ); ok( !r && GetLastError() == ERROR_INVALID_PARAMETER, - "expected GetLastError() is ERROR_INVALID_PARAMETER, got %d\n", + "expected GetLastError() is ERROR_INVALID_PARAMETER, got %ld\n", GetLastError() ); r = ConvertStringSidToSidA( noSubAuthStr, &psid ); ok( !r, "expected failure with no sub authorities\n" ); ok( GetLastError() == ERROR_INVALID_SID, - "expected GetLastError() is ERROR_INVALID_SID, got %d\n", + "expected GetLastError() is ERROR_INVALID_SID, got %ld\n", GetLastError() ); r = ConvertStringSidToSidA( "WDandmorecharacters", &psid ); ok( !r, "expected failure with too many characters\n" ); ok( GetLastError() == ERROR_INVALID_SID, - "expected GetLastError() is ERROR_INVALID_SID, got %d\n", + "expected GetLastError() is ERROR_INVALID_SID, got %ld\n", GetLastError() ); r = ConvertStringSidToSidA( "WD)", &psid ); ok( !r, "expected failure with too many characters\n" ); ok( GetLastError() == ERROR_INVALID_SID, - "expected GetLastError() is ERROR_INVALID_SID, got %d\n", + "expected GetLastError() is ERROR_INVALID_SID, got %ld\n", GetLastError() ); ok(ConvertStringSidToSidA("S-1-5-21-93476-23408-4576", &psid), "ConvertStringSidToSidA failed\n"); pisid = psid; ok(pisid->SubAuthorityCount == 4, "Invalid sub authority count - expected 4, got %d\n", pisid->SubAuthorityCount); - ok(pisid->SubAuthority[0] == 21, "Invalid subauthority 0 - expected 21, got %d\n", pisid->SubAuthority[0]); - ok(pisid->SubAuthority[3] == 4576, "Invalid subauthority 0 - expected 4576, got %d\n", pisid->SubAuthority[3]); + ok(pisid->SubAuthority[0] == 21, "Invalid subauthority 0 - expected 21, got %ld\n", pisid->SubAuthority[0]); + ok(pisid->SubAuthority[3] == 4576, "Invalid subauthority 0 - expected 4576, got %ld\n", pisid->SubAuthority[3]); LocalFree(str); LocalFree(psid); @@ -386,7 +386,7 @@ static void test_ConvertStringSidToSid(void) !memcmp( pisid->IdentifierAuthority.Value, refs[i].auth.Value, sizeof(refs[i].auth) ), "string sid %s didn't parse to expected value\n" - "(got 0x%04x%08x, expected 0x%04x%08x)\n", + "(got 0x%04x%08lx, expected 0x%04x%08lx)\n", refs[i].refStr, MAKEWORD( pisid->IdentifierAuthority.Value[1], pisid->IdentifierAuthority.Value[0] ), @@ -625,17 +625,17 @@ static void test_allocateLuid(void) return; ok(ret, - "AllocateLocallyUniqueId failed: %d\n", GetLastError()); + "AllocateLocallyUniqueId failed: %ld\n", GetLastError()); ret = pAllocateLocallyUniqueId(&luid2); ok( ret, - "AllocateLocallyUniqueId failed: %d\n", GetLastError()); + "AllocateLocallyUniqueId failed: %ld\n", GetLastError()); ok(luid1.LowPart > SE_MAX_WELL_KNOWN_PRIVILEGE || luid1.HighPart != 0, "AllocateLocallyUniqueId returned a well-known LUID\n"); ok(luid1.LowPart != luid2.LowPart || luid1.HighPart != luid2.HighPart, "AllocateLocallyUniqueId returned non-unique LUIDs\n"); ret = pAllocateLocallyUniqueId(NULL); ok( !ret && GetLastError() == ERROR_NOACCESS, - "AllocateLocallyUniqueId(NULL) didn't return ERROR_NOACCESS: %d\n", + "AllocateLocallyUniqueId(NULL) didn't return ERROR_NOACCESS: %ld\n", GetLastError()); } @@ -661,18 +661,18 @@ static void test_lookupPrivilegeName(void) luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE; ret = pLookupPrivilegeNameA(NULL, &luid, NULL, &cchName); ok( !ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "LookupPrivilegeNameA didn't fail with ERROR_INSUFFICIENT_BUFFER: %d\n", + "LookupPrivilegeNameA didn't fail with ERROR_INSUFFICIENT_BUFFER: %ld\n", GetLastError()); ok(cchName == strlen("SeCreateTokenPrivilege") + 1, "LookupPrivilegeNameA returned an incorrect required length for\n" - "SeCreateTokenPrivilege (got %d, expected %d)\n", cchName, + "SeCreateTokenPrivilege (got %ld, expected %d)\n", cchName, lstrlenA("SeCreateTokenPrivilege") + 1); /* check a known value and its returned length on success */ cchName = sizeof(buf); ok(pLookupPrivilegeNameA(NULL, &luid, buf, &cchName) && cchName == strlen("SeCreateTokenPrivilege"), "LookupPrivilegeNameA returned an incorrect output length for\n" - "SeCreateTokenPrivilege (got %d, expected %d)\n", cchName, + "SeCreateTokenPrivilege (got %ld, expected %d)\n", cchName, (int)strlen("SeCreateTokenPrivilege")); /* check known values */ for (i = SE_MIN_WELL_KNOWN_PRIVILEGE; i <= SE_MAX_WELL_KNOWN_PRIVILEGE; i++) @@ -681,14 +681,14 @@ static void test_lookupPrivilegeName(void) cchName = sizeof(buf); ret = pLookupPrivilegeNameA(NULL, &luid, buf, &cchName); ok( ret || GetLastError() == ERROR_NO_SUCH_PRIVILEGE, - "LookupPrivilegeNameA(0.%d) failed: %d\n", i, GetLastError()); + "LookupPrivilegeNameA(0.%ld) failed: %ld\n", i, GetLastError()); } /* check a bogus LUID */ luid.LowPart = 0xdeadbeef; cchName = sizeof(buf); ret = pLookupPrivilegeNameA(NULL, &luid, buf, &cchName); ok( !ret && GetLastError() == ERROR_NO_SUCH_PRIVILEGE, - "LookupPrivilegeNameA didn't fail with ERROR_NO_SUCH_PRIVILEGE: %d\n", + "LookupPrivilegeNameA didn't fail with ERROR_NO_SUCH_PRIVILEGE: %ld\n", GetLastError()); /* check on a bogus system */ luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE; @@ -696,7 +696,7 @@ static void test_lookupPrivilegeName(void) ret = pLookupPrivilegeNameA("b0gu5.Nam3", &luid, buf, &cchName); ok( !ret && (GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR) /* w2k8 */, - "LookupPrivilegeNameA didn't fail with RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR: %d\n", + "LookupPrivilegeNameA didn't fail with RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR: %ld\n", GetLastError()); } @@ -755,22 +755,22 @@ static void test_lookupPrivilegeValue(void) ret = pLookupPrivilegeValueA("b0gu5.Nam3", "SeCreateTokenPrivilege", &luid); ok( !ret && (GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR) /* w2k8 */, - "LookupPrivilegeValueA didn't fail with RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR: %d\n", + "LookupPrivilegeValueA didn't fail with RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR: %ld\n", GetLastError()); /* check a NULL string */ ret = pLookupPrivilegeValueA(NULL, 0, &luid); ok( !ret && GetLastError() == ERROR_NO_SUCH_PRIVILEGE, - "LookupPrivilegeValueA didn't fail with ERROR_NO_SUCH_PRIVILEGE: %d\n", + "LookupPrivilegeValueA didn't fail with ERROR_NO_SUCH_PRIVILEGE: %ld\n", GetLastError()); /* check a bogus privilege name */ ret = pLookupPrivilegeValueA(NULL, "SeBogusPrivilege", &luid); ok( !ret && GetLastError() == ERROR_NO_SUCH_PRIVILEGE, - "LookupPrivilegeValueA didn't fail with ERROR_NO_SUCH_PRIVILEGE: %d\n", + "LookupPrivilegeValueA didn't fail with ERROR_NO_SUCH_PRIVILEGE: %ld\n", GetLastError()); /* check case insensitive */ ret = pLookupPrivilegeValueA(NULL, "sEcREATEtOKENpRIVILEGE", &luid); ok( ret, - "LookupPrivilegeValueA(NULL, sEcREATEtOKENpRIVILEGE, &luid) failed: %d\n", + "LookupPrivilegeValueA(NULL, sEcREATEtOKENpRIVILEGE, &luid) failed: %ld\n", GetLastError()); for (i = 0; i < ARRAY_SIZE(privs); i++) { @@ -816,13 +816,13 @@ static void test_FileSecurity(void) SetLastError(0xdeadbeef); rc = CreateDirectoryA (path, NULL); ok (rc || GetLastError() == ERROR_ALREADY_EXISTS, "CreateDirectoryA " - "failed for '%s' with %d\n", path, GetLastError()); + "failed for '%s' with %ld\n", path, GetLastError()); strcat (strcpy (file, path), "\\ess"); SetLastError(0xdeadbeef); fh = CreateFileA (file, GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, 0, NULL); ok (fh != INVALID_HANDLE_VALUE, "CreateFileA " - "failed for '%s' with %d\n", file, GetLastError()); + "failed for '%s' with %ld\n", file, GetLastError()); CloseHandle (fh); /* For the temporary file ... */ @@ -838,8 +838,8 @@ static void test_FileSecurity(void) ok (!rc, "GetFileSecurityA " "was expected to fail for '%s'\n", file); ok (GetLastError() == ERROR_INSUFFICIENT_BUFFER, "GetFileSecurityA " - "returned %d; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError()); - ok (retSize > sizeof (SECURITY_DESCRIPTOR), "GetFileSecurityA returned size %d\n", retSize); + "returned %ld; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError()); + ok (retSize > sizeof (SECURITY_DESCRIPTOR), "GetFileSecurityA returned size %ld\n", retSize); sdSize = retSize; sd = HeapAlloc (GetProcessHeap (), 0, sdSize); @@ -849,16 +849,16 @@ static void test_FileSecurity(void) SetLastError(0xdeadbeef); rc = GetFileSecurityA (file, request, sd, sdSize, &retSize); ok (rc, "GetFileSecurityA " - "was not expected to fail '%s': %d\n", file, GetLastError()); + "was not expected to fail '%s': %ld\n", file, GetLastError()); ok (retSize == sdSize || broken(retSize == 0), /* NT4 */ - "GetFileSecurityA returned size %d; expected %d\n", retSize, sdSize); + "GetFileSecurityA returned size %ld; expected %ld\n", retSize, sdSize); /* Use it to set security descriptor */ SetLastError(0xdeadbeef); rc = pSetFileSecurityA (file, request, sd); ok (rc, "SetFileSecurityA " - "was not expected to fail '%s': %d\n", file, GetLastError()); + "was not expected to fail '%s': %ld\n", file, GetLastError()); HeapFree (GetProcessHeap (), 0, sd); @@ -871,8 +871,8 @@ static void test_FileSecurity(void) ok (!rc, "GetFileSecurityA " "was expected to fail for '%s'\n", path); ok (GetLastError() == ERROR_INSUFFICIENT_BUFFER, "GetFileSecurityA " - "returned %d; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError()); - ok (retSize > sizeof (SECURITY_DESCRIPTOR), "GetFileSecurityA returned size %d\n", retSize); + "returned %ld; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError()); + ok (retSize > sizeof (SECURITY_DESCRIPTOR), "GetFileSecurityA returned size %ld\n", retSize); sdSize = retSize; sd = HeapAlloc (GetProcessHeap (), 0, sdSize); @@ -882,16 +882,16 @@ static void test_FileSecurity(void) SetLastError(0xdeadbeef); rc = GetFileSecurityA (path, request, sd, sdSize, &retSize); ok (rc, "GetFileSecurityA " - "was not expected to fail '%s': %d\n", path, GetLastError()); + "was not expected to fail '%s': %ld\n", path, GetLastError()); ok (retSize == sdSize || broken(retSize == 0), /* NT4 */ - "GetFileSecurityA returned size %d; expected %d\n", retSize, sdSize); + "GetFileSecurityA returned size %ld; expected %ld\n", retSize, sdSize); /* Use it to set security descriptor */ SetLastError(0xdeadbeef); rc = pSetFileSecurityA (path, request, sd); ok (rc, "SetFileSecurityA " - "was not expected to fail '%s': %d\n", path, GetLastError()); + "was not expected to fail '%s': %ld\n", path, GetLastError()); HeapFree (GetProcessHeap (), 0, sd); /* Old test */ @@ -900,7 +900,7 @@ static void test_FileSecurity(void) rc = GetFileSecurityA (wintmpdir, OWNER_SECURITY_INFORMATION, NULL, 0, &sdSize); ok (!rc, "GetFileSecurityA should fail for not existing directories/files\n"); ok (GetLastError() == ERROR_FILE_NOT_FOUND, - "last error ERROR_FILE_NOT_FOUND expected, got %d\n", GetLastError()); + "last error ERROR_FILE_NOT_FOUND expected, got %ld\n", GetLastError()); cleanup: /* Remove temporary file and directory */ @@ -910,245 +910,245 @@ cleanup: /* Test file access permissions for a file with FILE_ATTRIBUTE_ARCHIVE */ SetLastError(0xdeadbeef); rc = GetTempPathA(sizeof(wintmpdir), wintmpdir); - ok(rc, "GetTempPath error %d\n", GetLastError()); + ok(rc, "GetTempPath error %ld\n", GetLastError()); SetLastError(0xdeadbeef); rc = GetTempFileNameA(wintmpdir, "tmp", 0, file); - ok(rc, "GetTempFileName error %d\n", GetLastError()); + ok(rc, "GetTempFileName error %ld\n", GetLastError()); rc = GetFileAttributesA(file); rc &= ~(FILE_ATTRIBUTE_NOT_CONTENT_INDEXED|FILE_ATTRIBUTE_COMPRESSED); - ok(rc == FILE_ATTRIBUTE_ARCHIVE, "expected FILE_ATTRIBUTE_ARCHIVE got %#x\n", rc); + ok(rc == FILE_ATTRIBUTE_ARCHIVE, "expected FILE_ATTRIBUTE_ARCHIVE got %#lx\n", rc); rc = GetFileSecurityA(file, OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|DACL_SECURITY_INFORMATION, NULL, 0, &sdSize); ok(!rc, "GetFileSecurity should fail\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "expected ERROR_INSUFFICIENT_BUFFER got %d\n", GetLastError()); - ok(sdSize > sizeof(SECURITY_DESCRIPTOR), "got sd size %d\n", sdSize); + "expected ERROR_INSUFFICIENT_BUFFER got %ld\n", GetLastError()); + ok(sdSize > sizeof(SECURITY_DESCRIPTOR), "got sd size %ld\n", sdSize); sd = HeapAlloc(GetProcessHeap (), 0, sdSize); retSize = 0xdeadbeef; SetLastError(0xdeadbeef); rc = GetFileSecurityA(file, OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|DACL_SECURITY_INFORMATION, sd, sdSize, &retSize); - ok(rc, "GetFileSecurity error %d\n", GetLastError()); - ok(retSize == sdSize || broken(retSize == 0) /* NT4 */, "expected %d, got %d\n", sdSize, retSize); + ok(rc, "GetFileSecurity error %ld\n", GetLastError()); + ok(retSize == sdSize || broken(retSize == 0) /* NT4 */, "expected %ld, got %ld\n", sdSize, retSize); SetLastError(0xdeadbeef); rc = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, TRUE, &token); ok(!rc, "OpenThreadToken should fail\n"); - ok(GetLastError() == ERROR_NO_TOKEN, "expected ERROR_NO_TOKEN, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_NO_TOKEN, "expected ERROR_NO_TOKEN, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); rc = ImpersonateSelf(SecurityIdentification); - ok(rc, "ImpersonateSelf error %d\n", GetLastError()); + ok(rc, "ImpersonateSelf error %ld\n", GetLastError()); SetLastError(0xdeadbeef); rc = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, TRUE, &token); - ok(rc, "OpenThreadToken error %d\n", GetLastError()); + ok(rc, "OpenThreadToken error %ld\n", GetLastError()); SetLastError(0xdeadbeef); rc = RevertToSelf(); - ok(rc, "RevertToSelf error %d\n", GetLastError()); + ok(rc, "RevertToSelf error %ld\n", GetLastError()); priv_set_len = sizeof(priv_set); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_READ_DATA, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_READ_DATA, "expected FILE_READ_DATA, got %#x\n", granted); + ok(granted == FILE_READ_DATA, "expected FILE_READ_DATA, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_WRITE_DATA, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_WRITE_DATA, "expected FILE_WRITE_DATA, got %#x\n", granted); + ok(granted == FILE_WRITE_DATA, "expected FILE_WRITE_DATA, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_EXECUTE, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_EXECUTE, "expected FILE_EXECUTE, got %#x\n", granted); + ok(granted == FILE_EXECUTE, "expected FILE_EXECUTE, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, DELETE, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == DELETE, "expected DELETE, got %#x\n", granted); + ok(granted == DELETE, "expected DELETE, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_DELETE_CHILD, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_DELETE_CHILD, "expected FILE_DELETE_CHILD, got %#x\n", granted); + ok(granted == FILE_DELETE_CHILD, "expected FILE_DELETE_CHILD, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, 0x1ff, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == 0x1ff, "expected 0x1ff, got %#x\n", granted); + ok(granted == 0x1ff, "expected 0x1ff, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_ALL_ACCESS, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#x\n", granted); + ok(granted == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#lx\n", granted); SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, 0xffffffff, &mapping, &priv_set, &priv_set_len, &granted, &status); ok(!rc, "AccessCheck should fail\n"); - ok(GetLastError() == ERROR_GENERIC_NOT_MAPPED, "expected ERROR_GENERIC_NOT_MAPPED, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_GENERIC_NOT_MAPPED, "expected ERROR_GENERIC_NOT_MAPPED, got %ld\n", GetLastError()); /* Test file access permissions for a file with FILE_ATTRIBUTE_READONLY */ SetLastError(0xdeadbeef); fh = CreateFileA(file, FILE_READ_DATA, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_READONLY, 0); - ok(fh != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(fh != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); retSize = 0xdeadbeef; SetLastError(0xdeadbeef); rc = WriteFile(fh, "1", 1, &retSize, NULL); ok(!rc, "WriteFile should fail\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); - ok(retSize == 0, "expected 0, got %d\n", retSize); + ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); + ok(retSize == 0, "expected 0, got %ld\n", retSize); CloseHandle(fh); rc = GetFileAttributesA(file); rc &= ~(FILE_ATTRIBUTE_NOT_CONTENT_INDEXED|FILE_ATTRIBUTE_COMPRESSED); todo_wine ok(rc == (FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY), - "expected FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY got %#x\n", rc); + "expected FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY got %#lx\n", rc); SetLastError(0xdeadbeef); rc = SetFileAttributesA(file, FILE_ATTRIBUTE_ARCHIVE); - ok(rc, "SetFileAttributes error %d\n", GetLastError()); + ok(rc, "SetFileAttributes error %ld\n", GetLastError()); SetLastError(0xdeadbeef); rc = DeleteFileA(file); - ok(rc, "DeleteFile error %d\n", GetLastError()); + ok(rc, "DeleteFile error %ld\n", GetLastError()); SetLastError(0xdeadbeef); fh = CreateFileA(file, FILE_READ_DATA, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_READONLY, 0); - ok(fh != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(fh != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); retSize = 0xdeadbeef; SetLastError(0xdeadbeef); rc = WriteFile(fh, "1", 1, &retSize, NULL); ok(!rc, "WriteFile should fail\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); - ok(retSize == 0, "expected 0, got %d\n", retSize); + ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); + ok(retSize == 0, "expected 0, got %ld\n", retSize); CloseHandle(fh); rc = GetFileAttributesA(file); rc &= ~(FILE_ATTRIBUTE_NOT_CONTENT_INDEXED|FILE_ATTRIBUTE_COMPRESSED); ok(rc == (FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY), - "expected FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY got %#x\n", rc); + "expected FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY got %#lx\n", rc); retSize = 0xdeadbeef; SetLastError(0xdeadbeef); rc = GetFileSecurityA(file, OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|DACL_SECURITY_INFORMATION, sd, sdSize, &retSize); - ok(rc, "GetFileSecurity error %d\n", GetLastError()); - ok(retSize == sdSize || broken(retSize == 0) /* NT4 */, "expected %d, got %d\n", sdSize, retSize); + ok(rc, "GetFileSecurity error %ld\n", GetLastError()); + ok(retSize == sdSize || broken(retSize == 0) /* NT4 */, "expected %ld, got %ld\n", sdSize, retSize); priv_set_len = sizeof(priv_set); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_READ_DATA, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_READ_DATA, "expected FILE_READ_DATA, got %#x\n", granted); + ok(granted == FILE_READ_DATA, "expected FILE_READ_DATA, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_WRITE_DATA, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); todo_wine { ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_WRITE_DATA, "expected FILE_WRITE_DATA, got %#x\n", granted); + ok(granted == FILE_WRITE_DATA, "expected FILE_WRITE_DATA, got %#lx\n", granted); } granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_EXECUTE, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_EXECUTE, "expected FILE_EXECUTE, got %#x\n", granted); + ok(granted == FILE_EXECUTE, "expected FILE_EXECUTE, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, DELETE, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == DELETE, "expected DELETE, got %#x\n", granted); + ok(granted == DELETE, "expected DELETE, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, WRITE_OWNER, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == WRITE_OWNER, "expected WRITE_OWNER, got %#x\n", granted); + ok(granted == WRITE_OWNER, "expected WRITE_OWNER, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, SYNCHRONIZE, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == SYNCHRONIZE, "expected SYNCHRONIZE, got %#x\n", granted); + ok(granted == SYNCHRONIZE, "expected SYNCHRONIZE, got %#lx\n", granted); granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_DELETE_CHILD, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); todo_wine { ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_DELETE_CHILD, "expected FILE_DELETE_CHILD, got %#x\n", granted); + ok(granted == FILE_DELETE_CHILD, "expected FILE_DELETE_CHILD, got %#lx\n", granted); } granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, 0x1ff, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); todo_wine { ok(status == 1, "expected 1, got %d\n", status); - ok(granted == 0x1ff, "expected 0x1ff, got %#x\n", granted); + ok(granted == 0x1ff, "expected 0x1ff, got %#lx\n", granted); } granted = 0xdeadbeef; status = 0xdeadbeef; SetLastError(0xdeadbeef); rc = AccessCheck(sd, token, FILE_ALL_ACCESS, &mapping, &priv_set, &priv_set_len, &granted, &status); - ok(rc, "AccessCheck error %d\n", GetLastError()); + ok(rc, "AccessCheck error %ld\n", GetLastError()); todo_wine { ok(status == 1, "expected 1, got %d\n", status); - ok(granted == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#x\n", granted); + ok(granted == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#lx\n", granted); } SetLastError(0xdeadbeef); rc = DeleteFileA(file); ok(!rc, "DeleteFile should fail\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); rc = SetFileAttributesA(file, FILE_ATTRIBUTE_ARCHIVE); - ok(rc, "SetFileAttributes error %d\n", GetLastError()); + ok(rc, "SetFileAttributes error %ld\n", GetLastError()); SetLastError(0xdeadbeef); rc = DeleteFileA(file); - ok(rc, "DeleteFile error %d\n", GetLastError()); + ok(rc, "DeleteFile error %ld\n", GetLastError()); CloseHandle(token); HeapFree(GetProcessHeap(), 0, sd); @@ -1196,38 +1196,38 @@ static void test_AccessCheck(void) HeapFree(GetProcessHeap(), 0, Acl); return; } - ok(res, "InitializeAcl failed with error %d\n", GetLastError()); + ok(res, "InitializeAcl failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &EveryoneSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthNT, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdminSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthNT, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS, 0, 0, 0, 0, 0, 0, &UsersSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); SecurityDescriptor = HeapAlloc(GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH); res = InitializeSecurityDescriptor(SecurityDescriptor, SECURITY_DESCRIPTOR_REVISION); - ok(res, "InitializeSecurityDescriptor failed with error %d\n", GetLastError()); + ok(res, "InitializeSecurityDescriptor failed with error %ld\n", GetLastError()); res = SetSecurityDescriptorDacl(SecurityDescriptor, TRUE, Acl, FALSE); - ok(res, "SetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); PrivSetLen = FIELD_OFFSET(PRIVILEGE_SET, Privilege[16]); PrivSet = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, PrivSetLen); PrivSet->PrivilegeCount = 16; res = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE|TOKEN_QUERY, &ProcessToken); - ok(res, "OpenProcessToken failed with error %d\n", GetLastError()); + ok(res, "OpenProcessToken failed with error %ld\n", GetLastError()); pRtlAdjustPrivilege(SE_SECURITY_PRIVILEGE, FALSE, TRUE, &Enabled); res = DuplicateToken(ProcessToken, SecurityImpersonation, &Token); - ok(res, "DuplicateToken failed with error %d\n", GetLastError()); + ok(res, "DuplicateToken failed with error %ld\n", GetLastError()); /* SD without owner/group */ SetLastError(0xdeadbeef); @@ -1236,15 +1236,15 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_INVALID_SECURITY_DESCR, "AccessCheck should have " - "failed with ERROR_INVALID_SECURITY_DESCR, instead of %d\n", err); + "failed with ERROR_INVALID_SECURITY_DESCR, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); /* Set owner and group */ res = SetSecurityDescriptorOwner(SecurityDescriptor, AdminSid, FALSE); - ok(res, "SetSecurityDescriptorOwner failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorOwner failed with error %ld\n", GetLastError()); res = SetSecurityDescriptorGroup(SecurityDescriptor, UsersSid, TRUE); - ok(res, "SetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); /* Generic access mask */ SetLastError(0xdeadbeef); @@ -1253,7 +1253,7 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_GENERIC_NOT_MAPPED, "AccessCheck should have failed " - "with ERROR_GENERIC_NOT_MAPPED, instead of %d\n", err); + "with ERROR_GENERIC_NOT_MAPPED, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1264,7 +1264,7 @@ static void test_AccessCheck(void) NULL, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have failed " - "with ERROR_NOACCESS, instead of %d\n", err); + "with ERROR_NOACCESS, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1275,7 +1275,7 @@ static void test_AccessCheck(void) PrivSet, NULL, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have failed " - "with ERROR_NOACCESS, instead of %d\n", err); + "with ERROR_NOACCESS, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1286,19 +1286,19 @@ static void test_AccessCheck(void) NULL, NULL, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have failed " - "with ERROR_NOACCESS, instead of %d\n", err); + "with ERROR_NOACCESS, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); /* sd with no dacl present */ Access = AccessStatus = 0x1abe11ed; ret = SetSecurityDescriptorDacl(SecurityDescriptor, FALSE, NULL, FALSE); - ok(ret, "SetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(ret, "SetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); ok(AccessStatus && (Access == KEY_READ), - "AccessCheck failed to grant access with error %d\n", + "AccessCheck failed to grant access with error %ld\n", GetLastError()); /* sd with no dacl present - no privilegeset buffer */ @@ -1308,7 +1308,7 @@ static void test_AccessCheck(void) NULL, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have failed " - "with ERROR_NOACCESS, instead of %d\n", err); + "with ERROR_NOACCESS, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1323,12 +1323,12 @@ static void test_AccessCheck(void) NULL, &ntPrivSetLen, &Access, &ntAccessStatus); err = GetLastError(); ok(ntret == STATUS_ACCESS_VIOLATION, - "NtAccessCheck should have failed with STATUS_ACCESS_VIOLATION, got %x\n", ntret); + "NtAccessCheck should have failed with STATUS_ACCESS_VIOLATION, got %lx\n", ntret); ok(err == 0xdeadbeef, - "NtAccessCheck shouldn't set last error, got %d\n", err); + "NtAccessCheck shouldn't set last error, got %ld\n", err); ok(Access == 0x1abe11ed && ntAccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); - ok(ntPrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", ntPrivSetLen); + ok(ntPrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", ntPrivSetLen); /* Generic access mask - no returnlength */ SetLastError(0xdeadbeef); @@ -1337,9 +1337,9 @@ static void test_AccessCheck(void) PrivSet, NULL, &Access, &ntAccessStatus); err = GetLastError(); ok(ntret == STATUS_ACCESS_VIOLATION, - "NtAccessCheck should have failed with STATUS_ACCESS_VIOLATION, got %x\n", ntret); + "NtAccessCheck should have failed with STATUS_ACCESS_VIOLATION, got %lx\n", ntret); ok(err == 0xdeadbeef, - "NtAccessCheck shouldn't set last error, got %d\n", err); + "NtAccessCheck shouldn't set last error, got %ld\n", err); ok(Access == 0x1abe11ed && ntAccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1350,9 +1350,9 @@ static void test_AccessCheck(void) NULL, NULL, &Access, &ntAccessStatus); err = GetLastError(); ok(ntret == STATUS_ACCESS_VIOLATION, - "NtAccessCheck should have failed with STATUS_ACCESS_VIOLATION, got %x\n", ntret); + "NtAccessCheck should have failed with STATUS_ACCESS_VIOLATION, got %lx\n", ntret); ok(err == 0xdeadbeef, - "NtAccessCheck shouldn't set last error, got %d\n", err); + "NtAccessCheck shouldn't set last error, got %ld\n", err); ok(Access == 0x1abe11ed && ntAccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1364,12 +1364,12 @@ static void test_AccessCheck(void) PrivSet, &ntPrivSetLen, &Access, &ntAccessStatus); err = GetLastError(); ok(ntret == STATUS_GENERIC_NOT_MAPPED, - "NtAccessCheck should have failed with STATUS_GENERIC_NOT_MAPPED, got %x\n", ntret); + "NtAccessCheck should have failed with STATUS_GENERIC_NOT_MAPPED, got %lx\n", ntret); ok(err == 0xdeadbeef, - "NtAccessCheck shouldn't set last error, got %d\n", err); + "NtAccessCheck shouldn't set last error, got %ld\n", err); ok(Access == 0x1abe11ed && ntAccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); - ok(ntPrivSetLen == 0, "PrivSetLen returns %d\n", ntPrivSetLen); + ok(ntPrivSetLen == 0, "PrivSetLen returns %ld\n", ntPrivSetLen); /* Generic access mask - insufficient returnlength */ SetLastError(0xdeadbeef); @@ -1379,12 +1379,12 @@ static void test_AccessCheck(void) PrivSet, &ntPrivSetLen, &Access, &ntAccessStatus); err = GetLastError(); ok(ntret == STATUS_GENERIC_NOT_MAPPED, - "NtAccessCheck should have failed with STATUS_GENERIC_NOT_MAPPED, got %x\n", ntret); + "NtAccessCheck should have failed with STATUS_GENERIC_NOT_MAPPED, got %lx\n", ntret); ok(err == 0xdeadbeef, - "NtAccessCheck shouldn't set last error, got %d\n", err); + "NtAccessCheck shouldn't set last error, got %ld\n", err); ok(Access == 0x1abe11ed && ntAccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); - ok(ntPrivSetLen == sizeof(PRIVILEGE_SET)-1, "PrivSetLen returns %d\n", ntPrivSetLen); + ok(ntPrivSetLen == sizeof(PRIVILEGE_SET)-1, "PrivSetLen returns %ld\n", ntPrivSetLen); /* Key access mask - zero returnlength */ SetLastError(0xdeadbeef); @@ -1394,12 +1394,12 @@ static void test_AccessCheck(void) PrivSet, &ntPrivSetLen, &Access, &ntAccessStatus); err = GetLastError(); ok(ntret == STATUS_BUFFER_TOO_SMALL, - "NtAccessCheck should have failed with STATUS_BUFFER_TOO_SMALL, got %x\n", ntret); + "NtAccessCheck should have failed with STATUS_BUFFER_TOO_SMALL, got %lx\n", ntret); ok(err == 0xdeadbeef, - "NtAccessCheck shouldn't set last error, got %d\n", err); + "NtAccessCheck shouldn't set last error, got %ld\n", err); ok(Access == 0x1abe11ed && ntAccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); - ok(ntPrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", ntPrivSetLen); + ok(ntPrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", ntPrivSetLen); /* Key access mask - insufficient returnlength */ SetLastError(0xdeadbeef); @@ -1409,12 +1409,12 @@ static void test_AccessCheck(void) PrivSet, &ntPrivSetLen, &Access, &ntAccessStatus); err = GetLastError(); ok(ntret == STATUS_BUFFER_TOO_SMALL, - "NtAccessCheck should have failed with STATUS_BUFFER_TOO_SMALL, got %x\n", ntret); + "NtAccessCheck should have failed with STATUS_BUFFER_TOO_SMALL, got %lx\n", ntret); ok(err == 0xdeadbeef, - "NtAccessCheck shouldn't set last error, got %d\n", err); + "NtAccessCheck shouldn't set last error, got %ld\n", err); ok(Access == 0x1abe11ed && ntAccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); - ok(ntPrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", ntPrivSetLen); + ok(ntPrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", ntPrivSetLen); } else win_skip("NtAccessCheck unavailable. Skipping.\n"); @@ -1422,53 +1422,53 @@ static void test_AccessCheck(void) /* sd with NULL dacl */ Access = AccessStatus = 0x1abe11ed; ret = SetSecurityDescriptorDacl(SecurityDescriptor, TRUE, NULL, FALSE); - ok(ret, "SetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(ret, "SetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); ok(AccessStatus && (Access == KEY_READ), - "AccessCheck failed to grant access with error %d\n", + "AccessCheck failed to grant access with error %ld\n", GetLastError()); ret = AccessCheck(SecurityDescriptor, Token, MAXIMUM_ALLOWED, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); ok(AccessStatus && (Access == KEY_ALL_ACCESS), - "AccessCheck failed to grant access with error %d\n", + "AccessCheck failed to grant access with error %ld\n", GetLastError()); /* sd with blank dacl */ ret = SetSecurityDescriptorDacl(SecurityDescriptor, TRUE, Acl, FALSE); - ok(ret, "SetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(ret, "SetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); err = GetLastError(); ok(!AccessStatus && err == ERROR_ACCESS_DENIED, "AccessCheck should have failed " - "with ERROR_ACCESS_DENIED, instead of %d\n", err); - ok(!Access, "Should have failed to grant any access, got 0x%08x\n", Access); + "with ERROR_ACCESS_DENIED, instead of %ld\n", err); + ok(!Access, "Should have failed to grant any access, got 0x%08lx\n", Access); res = AddAccessAllowedAce(Acl, ACL_REVISION, KEY_READ, EveryoneSid); - ok(res, "AddAccessAllowedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessAllowedAce failed with error %ld\n", GetLastError()); res = AddAccessDeniedAce(Acl, ACL_REVISION, KEY_SET_VALUE, AdminSid); - ok(res, "AddAccessDeniedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessDeniedAce failed with error %ld\n", GetLastError()); /* sd with dacl */ Access = AccessStatus = 0x1abe11ed; ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); ok(AccessStatus && (Access == KEY_READ), - "AccessCheck failed to grant access with error %d\n", + "AccessCheck failed to grant access with error %ld\n", GetLastError()); ret = AccessCheck(SecurityDescriptor, Token, MAXIMUM_ALLOWED, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); ok(AccessStatus, - "AccessCheck failed to grant any access with error %d\n", + "AccessCheck failed to grant any access with error %ld\n", GetLastError()); - trace("AccessCheck with MAXIMUM_ALLOWED got Access 0x%08x\n", Access); + trace("AccessCheck with MAXIMUM_ALLOWED got Access 0x%08lx\n", Access); /* Null PrivSet with null PrivSetLen pointer */ SetLastError(0xdeadbeef); @@ -1477,7 +1477,7 @@ static void test_AccessCheck(void) NULL, NULL, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have " - "failed with ERROR_NOACCESS, instead of %d\n", err); + "failed with ERROR_NOACCESS, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1490,9 +1490,9 @@ static void test_AccessCheck(void) err = GetLastError(); todo_wine ok(!ret && err == ERROR_INSUFFICIENT_BUFFER, "AccessCheck should have " - "failed with ERROR_INSUFFICIENT_BUFFER, instead of %d\n", err); + "failed with ERROR_INSUFFICIENT_BUFFER, instead of %ld\n", err); todo_wine - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1504,8 +1504,8 @@ static void test_AccessCheck(void) 0, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have " - "failed with ERROR_NOACCESS, instead of %d\n", err); - ok(PrivSetLen == 1, "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_NOACCESS, instead of %ld\n", err); + ok(PrivSetLen == 1, "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1517,8 +1517,8 @@ static void test_AccessCheck(void) 0, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have " - "failed with ERROR_NOACCESS, instead of %d\n", err); - ok(PrivSetLen == sizeof(PRIVILEGE_SET) - 1, "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_NOACCESS, instead of %ld\n", err); + ok(PrivSetLen == sizeof(PRIVILEGE_SET) - 1, "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1530,8 +1530,8 @@ static void test_AccessCheck(void) 0, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have " - "failed with ERROR_NOACCESS, instead of %d\n", err); - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_NOACCESS, instead of %ld\n", err); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1543,8 +1543,8 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_INSUFFICIENT_BUFFER, "AccessCheck should have " - "failed with ERROR_INSUFFICIENT_BUFFER, instead of %d\n", err); - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_INSUFFICIENT_BUFFER, instead of %ld\n", err); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1556,8 +1556,8 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_INSUFFICIENT_BUFFER, "AccessCheck should have " - "failed with ERROR_INSUFFICIENT_BUFFER, instead of %d\n", err); - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_INSUFFICIENT_BUFFER, instead of %ld\n", err); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1570,8 +1570,8 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_INSUFFICIENT_BUFFER, "AccessCheck should have " - "failed with ERROR_INSUFFICIENT_BUFFER, instead of %d\n", err); - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_INSUFFICIENT_BUFFER, instead of %ld\n", err); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); ok(PrivSet->PrivilegeCount == 0xdeadbeef, "buffer contents should not be changed\n"); @@ -1584,11 +1584,11 @@ static void test_AccessCheck(void) ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(AccessStatus && (Access == KEY_READ), - "AccessCheck failed to grant access with error %d\n", GetLastError()); - ok(PrivSet->PrivilegeCount == 0, "PrivilegeCount returns %d, expects 0\n", + "AccessCheck failed to grant access with error %ld\n", GetLastError()); + ok(PrivSet->PrivilegeCount == 0, "PrivilegeCount returns %ld, expects 0\n", PrivSet->PrivilegeCount); /* Valid PrivSet with sufficient PrivSetLen */ @@ -1599,12 +1599,12 @@ static void test_AccessCheck(void) ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); todo_wine - ok(PrivSetLen == sizeof(PRIVILEGE_SET) + 1, "PrivSetLen returns %d\n", PrivSetLen); + ok(PrivSetLen == sizeof(PRIVILEGE_SET) + 1, "PrivSetLen returns %ld\n", PrivSetLen); ok(AccessStatus && (Access == KEY_READ), - "AccessCheck failed to grant access with error %d\n", GetLastError()); - ok(PrivSet->PrivilegeCount == 0, "PrivilegeCount returns %d, expects 0\n", + "AccessCheck failed to grant access with error %ld\n", GetLastError()); + ok(PrivSet->PrivilegeCount == 0, "PrivilegeCount returns %ld, expects 0\n", PrivSet->PrivilegeCount); PrivSetLen = FIELD_OFFSET(PRIVILEGE_SET, Privilege[16]); @@ -1616,7 +1616,7 @@ static void test_AccessCheck(void) 0, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NOACCESS, "AccessCheck should have " - "failed with ERROR_NOACCESS, instead of %d\n", err); + "failed with ERROR_NOACCESS, instead of %ld\n", err); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1625,22 +1625,22 @@ static void test_AccessCheck(void) Access = AccessStatus = 0x1abe11ed; ret = AccessCheck(SecurityDescriptor, Token, KEY_WRITE, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); err = GetLastError(); ok(!AccessStatus && err == ERROR_ACCESS_DENIED, "AccessCheck should have failed " - "with ERROR_ACCESS_DENIED, instead of %d\n", err); - ok(!Access, "Should have failed to grant any access, got 0x%08x\n", Access); + "with ERROR_ACCESS_DENIED, instead of %ld\n", err); + ok(!Access, "Should have failed to grant any access, got 0x%08lx\n", Access); SetLastError(0xdeadbeef); PrivSet->PrivilegeCount = 16; ret = AccessCheck(SecurityDescriptor, Token, ACCESS_SYSTEM_SECURITY, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); ok(ret && !AccessStatus && GetLastError() == ERROR_PRIVILEGE_NOT_HELD, - "AccessCheck should have failed with ERROR_PRIVILEGE_NOT_HELD, instead of %d\n", + "AccessCheck should have failed with ERROR_PRIVILEGE_NOT_HELD, instead of %ld\n", GetLastError()); ret = ImpersonateLoggedOnUser(Token); - ok(ret, "ImpersonateLoggedOnUser failed with error %d\n", GetLastError()); + ok(ret, "ImpersonateLoggedOnUser failed with error %ld\n", GetLastError()); ret = pRtlAdjustPrivilege(SE_SECURITY_PRIVILEGE, TRUE, TRUE, &Enabled); if (!ret) { @@ -1652,8 +1652,8 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_INSUFFICIENT_BUFFER, "AccessCheck should have " - "failed with ERROR_INSUFFICIENT_BUFFER, instead of %d\n", err); - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_INSUFFICIENT_BUFFER, instead of %ld\n", err); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1665,8 +1665,8 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_INSUFFICIENT_BUFFER, "AccessCheck should have " - "failed with ERROR_INSUFFICIENT_BUFFER, instead of %d\n", err); - ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %d\n", PrivSetLen); + "failed with ERROR_INSUFFICIENT_BUFFER, instead of %ld\n", err); + ok(PrivSetLen == sizeof(PRIVILEGE_SET), "PrivSetLen returns %ld\n", PrivSetLen); ok(Access == 0x1abe11ed && AccessStatus == 0x1abe11ed, "Access and/or AccessStatus were changed!\n"); @@ -1678,12 +1678,12 @@ static void test_AccessCheck(void) ret = AccessCheck(SecurityDescriptor, Token, ACCESS_SYSTEM_SECURITY, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); ok(ret && AccessStatus && GetLastError() == 0xdeadbeef, - "AccessCheck should have succeeded, error %d\n", + "AccessCheck should have succeeded, error %ld\n", GetLastError()); ok(Access == ACCESS_SYSTEM_SECURITY, - "Access should be equal to ACCESS_SYSTEM_SECURITY instead of 0x%08x\n", + "Access should be equal to ACCESS_SYSTEM_SECURITY instead of 0x%08lx\n", Access); - ok(PrivSet->PrivilegeCount == 1, "PrivilegeCount returns %d, expects 1\n", + ok(PrivSet->PrivilegeCount == 1, "PrivilegeCount returns %ld, expects 1\n", PrivSet->PrivilegeCount); /* Valid PrivSet with large PrivSetLen */ @@ -1694,23 +1694,23 @@ static void test_AccessCheck(void) ret = AccessCheck(SecurityDescriptor, Token, ACCESS_SYSTEM_SECURITY, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); ok(ret && AccessStatus && GetLastError() == 0xdeadbeef, - "AccessCheck should have succeeded, error %d\n", + "AccessCheck should have succeeded, error %ld\n", GetLastError()); ok(Access == ACCESS_SYSTEM_SECURITY, - "Access should be equal to ACCESS_SYSTEM_SECURITY instead of 0x%08x\n", + "Access should be equal to ACCESS_SYSTEM_SECURITY instead of 0x%08lx\n", Access); - ok(PrivSet->PrivilegeCount == 1, "PrivilegeCount returns %d, expects 1\n", + ok(PrivSet->PrivilegeCount == 1, "PrivilegeCount returns %ld, expects 1\n", PrivSet->PrivilegeCount); } else trace("Couldn't get SE_SECURITY_PRIVILEGE (0x%08x), skipping ACCESS_SYSTEM_SECURITY test\n", ret); ret = RevertToSelf(); - ok(ret, "RevertToSelf failed with error %d\n", GetLastError()); + ok(ret, "RevertToSelf failed with error %ld\n", GetLastError()); /* test INHERIT_ONLY_ACE */ ret = InitializeAcl(Acl, 256, ACL_REVISION); - ok(ret, "InitializeAcl failed with error %d\n", GetLastError()); + ok(ret, "InitializeAcl failed with error %ld\n", GetLastError()); /* NT doesn't have AddAccessAllowedAceEx. Skipping this call/test doesn't influence * the next ones. @@ -1718,30 +1718,30 @@ static void test_AccessCheck(void) if (pAddAccessAllowedAceEx) { ret = pAddAccessAllowedAceEx(Acl, ACL_REVISION, INHERIT_ONLY_ACE, KEY_READ, EveryoneSid); - ok(ret, "AddAccessAllowedAceEx failed with error %d\n", GetLastError()); + ok(ret, "AddAccessAllowedAceEx failed with error %ld\n", GetLastError()); } else win_skip("AddAccessAllowedAceEx is not available\n"); ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); - ok(ret, "AccessCheck failed with error %d\n", GetLastError()); + ok(ret, "AccessCheck failed with error %ld\n", GetLastError()); err = GetLastError(); ok(!AccessStatus && err == ERROR_ACCESS_DENIED, "AccessCheck should have failed " - "with ERROR_ACCESS_DENIED, instead of %d\n", err); - ok(!Access, "Should have failed to grant any access, got 0x%08x\n", Access); + "with ERROR_ACCESS_DENIED, instead of %ld\n", err); + ok(!Access, "Should have failed to grant any access, got 0x%08lx\n", Access); CloseHandle(Token); res = DuplicateToken(ProcessToken, SecurityAnonymous, &Token); - ok(res, "DuplicateToken failed with error %d\n", GetLastError()); + ok(res, "DuplicateToken failed with error %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = AccessCheck(SecurityDescriptor, Token, MAXIMUM_ALLOWED, &Mapping, PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_BAD_IMPERSONATION_LEVEL, "AccessCheck should have failed " - "with ERROR_BAD_IMPERSONATION_LEVEL, instead of %d\n", err); + "with ERROR_BAD_IMPERSONATION_LEVEL, instead of %ld\n", err); CloseHandle(Token); @@ -1750,7 +1750,7 @@ static void test_AccessCheck(void) PrivSet, &PrivSetLen, &Access, &AccessStatus); err = GetLastError(); ok(!ret && err == ERROR_NO_IMPERSONATION_TOKEN, "AccessCheck should have failed " - "with ERROR_NO_IMPERSONATION_TOKEN, instead of %d\n", err); + "with ERROR_NO_IMPERSONATION_TOKEN, instead of %ld\n", err); CloseHandle(ProcessToken); @@ -1788,40 +1788,40 @@ static void test_token_attr(void) win_skip("OpenProcessToken is not implemented\n"); return; } - ok(ret, "OpenProcessToken failed with error %d\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %ld\n", GetLastError()); if (ret) { DWORD buf[256]; /* GetTokenInformation wants a dword-aligned buffer */ Size = sizeof(buf); ret = GetTokenInformation(Token, TokenUser,(void*)buf, Size, &Size); - ok(ret, "GetTokenInformation failed with error %d\n", GetLastError()); + ok(ret, "GetTokenInformation failed with error %ld\n", GetLastError()); Size = sizeof(ImpersonationLevel); ret = GetTokenInformation(Token, TokenImpersonationLevel, &ImpersonationLevel, Size, &Size); GLE = GetLastError(); - ok(!ret && (GLE == ERROR_INVALID_PARAMETER), "GetTokenInformation(TokenImpersonationLevel) on primary token should have failed with ERROR_INVALID_PARAMETER instead of %d\n", GLE); + ok(!ret && (GLE == ERROR_INVALID_PARAMETER), "GetTokenInformation(TokenImpersonationLevel) on primary token should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GLE); CloseHandle(Token); } SetLastError(0xdeadbeef); ret = OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &Token); - ok(ret, "OpenProcessToken failed with error %d\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %ld\n", GetLastError()); /* groups */ /* insufficient buffer length */ SetLastError(0xdeadbeef); Size2 = 0; ret = GetTokenInformation(Token, TokenGroups, NULL, 0, &Size2); - ok(Size2 > 1, "got %d\n", Size2); + ok(Size2 > 1, "got %ld\n", Size2); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "%d with error %d\n", ret, GetLastError()); + "%d with error %ld\n", ret, GetLastError()); Size2 -= 1; Groups = HeapAlloc(GetProcessHeap(), 0, Size2); memset(Groups, 0xcc, Size2); Size = 0; ret = GetTokenInformation(Token, TokenGroups, Groups, Size2, &Size); - ok(Size > 1, "got %d\n", Size); + ok(Size > 1, "got %ld\n", Size); ok((!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER) || broken(ret) /* wow64 */, - "%d with error %d\n", ret, GetLastError()); + "%d with error %ld\n", ret, GetLastError()); if(!ret) ok(*((BYTE*)Groups) == 0xcc, "buffer altered\n"); @@ -1830,14 +1830,14 @@ static void test_token_attr(void) SetLastError(0xdeadbeef); ret = GetTokenInformation(Token, TokenGroups, NULL, 0, &Size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "GetTokenInformation(TokenGroups) %s with error %d\n", + "GetTokenInformation(TokenGroups) %s with error %ld\n", ret ? "succeeded" : "failed", GetLastError()); Groups = HeapAlloc(GetProcessHeap(), 0, Size); SetLastError(0xdeadbeef); ret = GetTokenInformation(Token, TokenGroups, Groups, Size, &Size); - ok(ret, "GetTokenInformation(TokenGroups) failed with error %d\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenGroups) failed with error %ld\n", GetLastError()); ok(GetLastError() == 0xdeadbeef, - "GetTokenInformation shouldn't have set last error to %d\n", + "GetTokenInformation shouldn't have set last error to %ld\n", GetLastError()); trace("TokenGroups:\n"); for (i = 0; i < Groups->GroupCount; i++) @@ -1853,24 +1853,24 @@ static void test_token_attr(void) if (ret) { ConvertSidToStringSidA(Groups->Groups[i].Sid, &SidString); - trace("%s, %s\\%s use: %d attr: 0x%08x\n", SidString, Domain, Name, SidNameUse, Groups->Groups[i].Attributes); + trace("%s, %s\\%s use: %d attr: 0x%08lx\n", SidString, Domain, Name, SidNameUse, Groups->Groups[i].Attributes); LocalFree(SidString); } - else trace("attr: 0x%08x LookupAccountSid failed with error %d\n", Groups->Groups[i].Attributes, GetLastError()); + else trace("attr: 0x%08lx LookupAccountSid failed with error %ld\n", Groups->Groups[i].Attributes, GetLastError()); } HeapFree(GetProcessHeap(), 0, Groups); /* user */ ret = GetTokenInformation(Token, TokenUser, NULL, 0, &Size); ok(!ret && (GetLastError() == ERROR_INSUFFICIENT_BUFFER), - "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); User = HeapAlloc(GetProcessHeap(), 0, Size); ret = GetTokenInformation(Token, TokenUser, User, Size, &Size); ok(ret, - "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); ConvertSidToStringSidA(User->User.Sid, &SidString); - trace("TokenUser: %s attr: 0x%08x\n", SidString, User->User.Attributes); + trace("TokenUser: %s attr: 0x%08lx\n", SidString, User->User.Attributes); LocalFree(SidString); HeapFree(GetProcessHeap(), 0, User); @@ -1881,14 +1881,14 @@ static void test_token_attr(void) else { ok(!ret && (GetLastError() == ERROR_INSUFFICIENT_BUFFER), - "GetTokenInformation(TokenLogonSid) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenLogonSid) failed with error %ld\n", GetLastError()); Groups = HeapAlloc(GetProcessHeap(), 0, Size); ret = GetTokenInformation(Token, TokenLogonSid, Groups, Size, &Size); ok(ret, - "GetTokenInformation(TokenLogonSid) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenLogonSid) failed with error %ld\n", GetLastError()); if (ret) { - ok(Groups->GroupCount == 1, "got %d\n", Groups->GroupCount); + ok(Groups->GroupCount == 1, "got %ld\n", Groups->GroupCount); if(Groups->GroupCount == 1) { ConvertSidToStringSidA(Groups->Groups[0].Sid, &SidString); @@ -1907,27 +1907,27 @@ static void test_token_attr(void) /* privileges */ ret = GetTokenInformation(Token, TokenPrivileges, NULL, 0, &Size); ok(!ret && (GetLastError() == ERROR_INSUFFICIENT_BUFFER), - "GetTokenInformation(TokenPrivileges) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenPrivileges) failed with error %ld\n", GetLastError()); Privileges = HeapAlloc(GetProcessHeap(), 0, Size); ret = GetTokenInformation(Token, TokenPrivileges, Privileges, Size, &Size); ok(ret, - "GetTokenInformation(TokenPrivileges) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenPrivileges) failed with error %ld\n", GetLastError()); trace("TokenPrivileges:\n"); for (i = 0; i < Privileges->PrivilegeCount; i++) { CHAR Name[256]; DWORD NameLen = ARRAY_SIZE(Name); LookupPrivilegeNameA(NULL, &Privileges->Privileges[i].Luid, Name, &NameLen); - trace("\t%s, 0x%x\n", Name, Privileges->Privileges[i].Attributes); + trace("\t%s, 0x%lx\n", Name, Privileges->Privileges[i].Attributes); } HeapFree(GetProcessHeap(), 0, Privileges); ret = DuplicateToken(Token, SecurityAnonymous, &ImpersonationToken); - ok(ret, "DuplicateToken failed with error %d\n", GetLastError()); + ok(ret, "DuplicateToken failed with error %ld\n", GetLastError()); Size = sizeof(ImpersonationLevel); ret = GetTokenInformation(ImpersonationToken, TokenImpersonationLevel, &ImpersonationLevel, Size, &Size); - ok(ret, "GetTokenInformation(TokenImpersonationLevel) failed with error %d\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenImpersonationLevel) failed with error %ld\n", GetLastError()); ok(ImpersonationLevel == SecurityAnonymous, "ImpersonationLevel should have been SecurityAnonymous instead of %d\n", ImpersonationLevel); CloseHandle(ImpersonationToken); @@ -1935,23 +1935,23 @@ static void test_token_attr(void) /* default dacl */ ret = GetTokenInformation(Token, TokenDefaultDacl, NULL, 0, &Size); ok(!ret && (GetLastError() == ERROR_INSUFFICIENT_BUFFER), - "GetTokenInformation(TokenDefaultDacl) failed with error %u\n", GetLastError()); + "GetTokenInformation(TokenDefaultDacl) failed with error %lu\n", GetLastError()); Dacl = HeapAlloc(GetProcessHeap(), 0, Size); ret = GetTokenInformation(Token, TokenDefaultDacl, Dacl, Size, &Size); - ok(ret, "GetTokenInformation(TokenDefaultDacl) failed with error %u\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenDefaultDacl) failed with error %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = SetTokenInformation(Token, TokenDefaultDacl, NULL, 0); GLE = GetLastError(); ok(!ret, "SetTokenInformation(TokenDefaultDacl) succeeded\n"); - ok(GLE == ERROR_BAD_LENGTH, "expected ERROR_BAD_LENGTH got %u\n", GLE); + ok(GLE == ERROR_BAD_LENGTH, "expected ERROR_BAD_LENGTH got %lu\n", GLE); SetLastError(0xdeadbeef); ret = SetTokenInformation(Token, TokenDefaultDacl, NULL, Size); GLE = GetLastError(); ok(!ret, "SetTokenInformation(TokenDefaultDacl) succeeded\n"); - ok(GLE == ERROR_NOACCESS, "expected ERROR_NOACCESS got %u\n", GLE); + ok(GLE == ERROR_NOACCESS, "expected ERROR_NOACCESS got %lu\n", GLE); acl = Dacl->DefaultDacl; Dacl->DefaultDacl = NULL; @@ -1962,18 +1962,18 @@ static void test_token_attr(void) Size2 = 0; Dacl->DefaultDacl = (ACL *)0xdeadbeef; ret = GetTokenInformation(Token, TokenDefaultDacl, Dacl, Size, &Size2); - ok(ret, "GetTokenInformation(TokenDefaultDacl) failed with error %u\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenDefaultDacl) failed with error %lu\n", GetLastError()); ok(Dacl->DefaultDacl == NULL, "expected NULL, got %p\n", Dacl->DefaultDacl); ok(Size2 == sizeof(TOKEN_DEFAULT_DACL) || broken(Size2 == 2*sizeof(TOKEN_DEFAULT_DACL)), /* WoW64 */ - "got %u expected sizeof(TOKEN_DEFAULT_DACL)\n", Size2); + "got %lu expected sizeof(TOKEN_DEFAULT_DACL)\n", Size2); Dacl->DefaultDacl = acl; ret = SetTokenInformation(Token, TokenDefaultDacl, Dacl, Size); - ok(ret, "SetTokenInformation(TokenDefaultDacl) failed with error %u\n", GetLastError()); + ok(ret, "SetTokenInformation(TokenDefaultDacl) failed with error %lu\n", GetLastError()); if (Size2 == sizeof(TOKEN_DEFAULT_DACL)) { ret = GetTokenInformation(Token, TokenDefaultDacl, Dacl, Size, &Size2); - ok(ret, "GetTokenInformation(TokenDefaultDacl) failed with error %u\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenDefaultDacl) failed with error %lu\n", GetLastError()); } else win_skip("TOKEN_DEFAULT_DACL size too small on WoW64\n"); @@ -1988,7 +1988,7 @@ static void test_GetTokenInformation(void) BOOL ret; ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &token); - ok(ret, "OpenProcessToken failed: %u\n", GetLastError()); + ok(ret, "OpenProcessToken failed: %lu\n", GetLastError()); size = 0; is_app_container = 0xdeadbeef; @@ -1996,10 +1996,10 @@ static void test_GetTokenInformation(void) sizeof(is_app_container), &size); ok(ret || broken(GetLastError() == ERROR_INVALID_PARAMETER || GetLastError() == ERROR_INVALID_FUNCTION), /* pre-win8 */ - "GetTokenInformation failed: %u\n", GetLastError()); + "GetTokenInformation failed: %lu\n", GetLastError()); if(ret) { - ok(size == sizeof(is_app_container), "size = %u\n", size); - ok(!is_app_container, "is_app_container = %x\n", is_app_container); + ok(size == sizeof(is_app_container), "size = %lu\n", size); + ok(!is_app_container, "is_app_container = %lx\n", is_app_container); } CloseHandle(token); @@ -2015,7 +2015,7 @@ static void test_sid_str(PSID * sid) { char *str_sid; BOOL ret = ConvertSidToStringSidA(sid, &str_sid); - ok(ret, "ConvertSidToStringSidA() failed: %d\n", GetLastError()); + ok(ret, "ConvertSidToStringSidA() failed: %ld\n", GetLastError()); if (ret) { char account[MAX_PATH], domain[MAX_PATH]; @@ -2024,7 +2024,7 @@ static void test_sid_str(PSID * sid) DWORD dom_size = MAX_PATH; ret = LookupAccountSidA (NULL, sid, account, &acc_size, domain, &dom_size, &use); ok(ret || GetLastError() == ERROR_NONE_MAPPED, - "LookupAccountSid(%s) failed: %d\n", str_sid, GetLastError()); + "LookupAccountSid(%s) failed: %ld\n", str_sid, GetLastError()); if (ret) trace(" %s %s\\%s %d\n", str_sid, domain, account, use); else if (GetLastError() == ERROR_NONE_MAPPED) @@ -2086,18 +2086,18 @@ static void test_CreateWellKnownSid(void) ret = CreateWellKnownSid(WinInteractiveSid, NULL, NULL, &size); error = GetLastError(); ok(!ret, "CreateWellKnownSid succeeded\n"); - ok(error == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %u\n", error); + ok(error == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %lu\n", error); ok(size, "expected size > 0\n"); SetLastError(0xdeadbeef); ret = CreateWellKnownSid(WinInteractiveSid, NULL, NULL, &size); error = GetLastError(); ok(!ret, "CreateWellKnownSid succeeded\n"); - ok(error == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %u\n", error); + ok(error == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %lu\n", error); sid = HeapAlloc(GetProcessHeap(), 0, size); ret = CreateWellKnownSid(WinInteractiveSid, NULL, sid, &size); - ok(ret, "CreateWellKnownSid failed %u\n", GetLastError()); + ok(ret, "CreateWellKnownSid failed %lu\n", GetLastError()); HeapFree(GetProcessHeap(), 0, sid); /* a domain sid usually have three subauthorities but we test that CreateWellKnownSid doesn't check it */ @@ -2123,7 +2123,7 @@ static void test_CreateWellKnownSid(void) cb = sizeof(sid_buffer); ok(CreateWellKnownSid(i, value->without_domain ? NULL : domainsid, sid_buffer, &cb), "Couldn't create well known sid %u\n", i); - expect_eq(GetSidLengthRequired(*GetSidSubAuthorityCount(sid_buffer)), cb, DWORD, "%d"); + expect_eq(GetSidLengthRequired(*GetSidSubAuthorityCount(sid_buffer)), cb, DWORD, "%ld"); ok(IsValidSid(sid_buffer), "The sid is not valid\n"); ok(ConvertSidToStringSidA(sid_buffer, &str), "Couldn't convert SID to string\n"); ok(strcmp(str, value->sid_string) == 0, "%d: SID mismatch - expected %s, got %s\n", i, @@ -2135,7 +2135,7 @@ static void test_CreateWellKnownSid(void) char buf2[SECURITY_MAX_SID_SIZE]; cb = sizeof(buf2); ok(CreateWellKnownSid(i, domainsid, buf2, &cb), "Couldn't create well known sid %u with optional domain\n", i); - expect_eq(GetSidLengthRequired(*GetSidSubAuthorityCount(sid_buffer)), cb, DWORD, "%d"); + expect_eq(GetSidLengthRequired(*GetSidSubAuthorityCount(sid_buffer)), cb, DWORD, "%ld"); ok(memcmp(buf2, sid_buffer, cb) == 0, "SID create with domain is different than without (%u)\n", i); } } @@ -2170,7 +2170,7 @@ static void test_LookupAccountSid(void) ret = AllocateAndInitializeSid(&SIDAuthNT, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS, 0, 0, 0, 0, 0, 0, &pUsersSid); ok(ret || (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), - "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); /* not running on NT so give up */ if (!ret && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)) @@ -2200,7 +2200,7 @@ static void test_LookupAccountSid(void) ret = LookupAccountSidA(NULL, pUsersSid, accountA, &acc_sizeA, domainA, &dom_sizeA, &use); ok(!ret, "LookupAccountSidA() Expected FALSE got TRUE\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "LookupAccountSidA() Expected ERROR_NOT_ENOUGH_MEMORY, got %u\n", GetLastError()); + "LookupAccountSidA() Expected ERROR_NOT_ENOUGH_MEMORY, got %lu\n", GetLastError()); /* try a 0 sized account buffer */ acc_sizeA = 0; @@ -2209,7 +2209,7 @@ static void test_LookupAccountSid(void) LookupAccountSidA(NULL, pUsersSid, accountA, &acc_sizeA, domainA, &dom_sizeA, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(acc_sizeA == real_acc_sizeA + 1, - "LookupAccountSidA() Expected acc_size = %u, got %u\n", + "LookupAccountSidA() Expected acc_size = %lu, got %lu\n", real_acc_sizeA + 1, acc_sizeA); /* try a 0 sized account buffer */ @@ -2218,7 +2218,7 @@ static void test_LookupAccountSid(void) LookupAccountSidA(NULL, pUsersSid, NULL, &acc_sizeA, domainA, &dom_sizeA, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(acc_sizeA == real_acc_sizeA + 1, - "LookupAccountSid() Expected acc_size = %u, got %u\n", + "LookupAccountSid() Expected acc_size = %lu, got %lu\n", real_acc_sizeA + 1, acc_sizeA); /* try a small domain buffer */ @@ -2228,7 +2228,7 @@ static void test_LookupAccountSid(void) ret = LookupAccountSidA(NULL, pUsersSid, accountA, &acc_sizeA, domainA, &dom_sizeA, &use); ok(!ret, "LookupAccountSidA() Expected FALSE got TRUE\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "LookupAccountSidA() Expected ERROR_NOT_ENOUGH_MEMORY, got %u\n", GetLastError()); + "LookupAccountSidA() Expected ERROR_NOT_ENOUGH_MEMORY, got %lu\n", GetLastError()); /* try a 0 sized domain buffer */ dom_sizeA = 0; @@ -2237,7 +2237,7 @@ static void test_LookupAccountSid(void) LookupAccountSidA(NULL, pUsersSid, accountA, &acc_sizeA, domainA, &dom_sizeA, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(dom_sizeA == real_dom_sizeA + 1, - "LookupAccountSidA() Expected dom_size = %u, got %u\n", + "LookupAccountSidA() Expected dom_size = %lu, got %lu\n", real_dom_sizeA + 1, dom_sizeA); /* try a 0 sized domain buffer */ @@ -2246,7 +2246,7 @@ static void test_LookupAccountSid(void) LookupAccountSidA(NULL, pUsersSid, accountA, &acc_sizeA, NULL, &dom_sizeA, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(dom_sizeA == real_dom_sizeA + 1, - "LookupAccountSidA() Expected dom_size = %u, got %u\n", + "LookupAccountSidA() Expected dom_size = %lu, got %lu\n", real_dom_sizeA + 1, dom_sizeA); real_acc_sizeW = MAX_PATH; @@ -2260,7 +2260,7 @@ static void test_LookupAccountSid(void) ret = LookupAccountSidA("deepthought", pUsersSid, accountA, &real_acc_sizeA, domainA, &real_dom_sizeA, &use); ok(!ret, "LookupAccountSidA() Expected FALSE got TRUE\n"); ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR /* Vista */, - "LookupAccountSidA() Expected RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR, got %u\n", GetLastError()); + "LookupAccountSidA() Expected RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR, got %lu\n", GetLastError()); /* native windows crashes if domainW or accountW is NULL */ @@ -2271,7 +2271,7 @@ static void test_LookupAccountSid(void) ret = LookupAccountSidW(NULL, pUsersSid, accountW, &acc_sizeW, domainW, &dom_sizeW, &use); ok(!ret, "LookupAccountSidW() Expected FALSE got TRUE\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "LookupAccountSidW() Expected ERROR_NOT_ENOUGH_MEMORY, got %u\n", GetLastError()); + "LookupAccountSidW() Expected ERROR_NOT_ENOUGH_MEMORY, got %lu\n", GetLastError()); /* try a 0 sized account buffer */ acc_sizeW = 0; @@ -2280,7 +2280,7 @@ static void test_LookupAccountSid(void) LookupAccountSidW(NULL, pUsersSid, accountW, &acc_sizeW, domainW, &dom_sizeW, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(acc_sizeW == real_acc_sizeW + 1, - "LookupAccountSidW() Expected acc_size = %u, got %u\n", + "LookupAccountSidW() Expected acc_size = %lu, got %lu\n", real_acc_sizeW + 1, acc_sizeW); /* try a 0 sized account buffer */ @@ -2289,7 +2289,7 @@ static void test_LookupAccountSid(void) LookupAccountSidW(NULL, pUsersSid, NULL, &acc_sizeW, domainW, &dom_sizeW, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(acc_sizeW == real_acc_sizeW + 1, - "LookupAccountSidW() Expected acc_size = %u, got %u\n", + "LookupAccountSidW() Expected acc_size = %lu, got %lu\n", real_acc_sizeW + 1, acc_sizeW); /* try a small domain buffer */ @@ -2299,7 +2299,7 @@ static void test_LookupAccountSid(void) ret = LookupAccountSidW(NULL, pUsersSid, accountW, &acc_sizeW, domainW, &dom_sizeW, &use); ok(!ret, "LookupAccountSidW() Expected FALSE got TRUE\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "LookupAccountSidW() Expected ERROR_NOT_ENOUGH_MEMORY, got %u\n", GetLastError()); + "LookupAccountSidW() Expected ERROR_NOT_ENOUGH_MEMORY, got %lu\n", GetLastError()); /* try a 0 sized domain buffer */ dom_sizeW = 0; @@ -2308,7 +2308,7 @@ static void test_LookupAccountSid(void) LookupAccountSidW(NULL, pUsersSid, accountW, &acc_sizeW, domainW, &dom_sizeW, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(dom_sizeW == real_dom_sizeW + 1, - "LookupAccountSidW() Expected dom_size = %u, got %u\n", + "LookupAccountSidW() Expected dom_size = %lu, got %lu\n", real_dom_sizeW + 1, dom_sizeW); /* try a 0 sized domain buffer */ @@ -2317,15 +2317,15 @@ static void test_LookupAccountSid(void) LookupAccountSidW(NULL, pUsersSid, accountW, &acc_sizeW, NULL, &dom_sizeW, &use); /* this can fail or succeed depending on OS version but the size will always be returned */ ok(dom_sizeW == real_dom_sizeW + 1, - "LookupAccountSidW() Expected dom_size = %u, got %u\n", + "LookupAccountSidW() Expected dom_size = %lu, got %lu\n", real_dom_sizeW + 1, dom_sizeW); acc_sizeW = dom_sizeW = use = 0; SetLastError(0xdeadbeef); ret = LookupAccountSidW(NULL, pUsersSid, NULL, &acc_sizeW, NULL, &dom_sizeW, &use); error = GetLastError(); - ok(!ret, "LookupAccountSidW failed %u\n", GetLastError()); - ok(error == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %u\n", error); + ok(!ret, "LookupAccountSidW failed %lu\n", GetLastError()); + ok(error == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %lu\n", error); ok(acc_sizeW, "expected non-zero account size\n"); ok(dom_sizeW, "expected non-zero domain size\n"); ok(!use, "expected zero use %u\n", use); @@ -2335,9 +2335,9 @@ static void test_LookupAccountSid(void) /* Test LookupAccountSid with Sid retrieved from token information. This assumes this process is running under the account of the current user.*/ ret = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY|TOKEN_DUPLICATE, &hToken); - ok(ret, "OpenProcessToken failed with error %d\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %ld\n", GetLastError()); ret = GetTokenInformation(hToken, TokenUser, NULL, 0, &cbti); - ok(!ret, "GetTokenInformation failed with error %d\n", GetLastError()); + ok(!ret, "GetTokenInformation failed with error %ld\n", GetLastError()); ptiUser = HeapAlloc(GetProcessHeap(), 0, cbti); if (GetTokenInformation(hToken, TokenUser, ptiUser, cbti, &cbti)) { @@ -2369,7 +2369,7 @@ static void test_LookupAccountSid(void) else { if (GetLastError() != ERROR_INVALID_PARAMETER) - trace(" CreateWellKnownSid(%d) failed: %d\n", i, GetLastError()); + trace(" CreateWellKnownSid(%d) failed: %ld\n", i, GetLastError()); else trace(" %d: not supported\n", i); } @@ -2380,20 +2380,20 @@ static void test_LookupAccountSid(void) status = LsaOpenPolicy( NULL, &object_attributes, POLICY_ALL_ACCESS, &handle); ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED, - "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08x\n", status); + "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08lx\n", status); /* try a more restricted access mask if necessary */ if (status == STATUS_ACCESS_DENIED) { trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION\n"); status = LsaOpenPolicy( NULL, &object_attributes, POLICY_VIEW_LOCAL_INFORMATION, &handle); - ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION) returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION) returned 0x%08lx\n", status); } if (status == STATUS_SUCCESS) { PPOLICY_ACCOUNT_DOMAIN_INFO info; status = LsaQueryInformationPolicy(handle, PolicyAccountDomainInformation, (PVOID*)&info); - ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy() failed, returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy() failed, returned 0x%08lx\n", status); if (status == STATUS_SUCCESS) { ok(info->DomainSid!=0, "LsaQueryInformationPolicy(PolicyAccountDomainInformation) missing SID\n"); @@ -2435,7 +2435,7 @@ static void test_LookupAccountSid(void) } status = LsaClose(handle); - ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08x\n", status); + ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08lx\n", status); } } @@ -2537,7 +2537,7 @@ static void test_LookupAccountName(void) user_size = UNLEN + 1; SetLastError(0xdeadbeef); ret = GetUserNameA(user_name, &user_size); - ok(ret, "Failed to get user name : %d\n", GetLastError()); + ok(ret, "Failed to get user name : %ld\n", GetLastError()); /* get sizes */ sid_size = 0; @@ -2552,7 +2552,7 @@ static void test_LookupAccountName(void) } ok(!ret, "Expected 0, got %d\n", ret); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); ok(sid_size != 0, "Expected non-zero sid size\n"); ok(domain_size != 0, "Expected non-zero domain size\n"); ok(sid_use == (SID_NAME_USE)0xcafebabe, "Expected 0xcafebabe, got %d\n", sid_use); @@ -2567,11 +2567,11 @@ static void test_LookupAccountName(void) ret = LookupAccountNameA(NULL, user_name, psid, &sid_size, domain, &domain_size, &sid_use); get_sid_info(psid, &account, &sid_dom); ok(ret, "Failed to lookup account name\n"); - ok(sid_size == GetLengthSid(psid), "Expected %d, got %d\n", GetLengthSid(psid), sid_size); + ok(sid_size == GetLengthSid(psid), "Expected %ld, got %ld\n", GetLengthSid(psid), sid_size); ok(!lstrcmpA(account, user_name), "Expected %s, got %s\n", user_name, account); ok(!lstrcmpiA(domain, sid_dom), "Expected %s, got %s\n", sid_dom, domain); - ok(domain_size == domain_save - 1, "Expected %d, got %d\n", domain_save - 1, domain_size); - ok(strlen(domain) == domain_size, "Expected %d, got %d\n", lstrlenA(domain), domain_size); + ok(domain_size == domain_save - 1, "Expected %ld, got %ld\n", domain_save - 1, domain_size); + ok(strlen(domain) == domain_size, "Expected %d, got %ld\n", lstrlenA(domain), domain_size); ok(sid_use == SidTypeUser, "Expected SidTypeUser (%d), got %d\n", SidTypeUser, sid_use); domain_size = domain_save; sid_size = sid_save; @@ -2588,8 +2588,8 @@ static void test_LookupAccountName(void) ok(sid_size != 0, "sid_size was zero\n"); ok(!lstrcmpA(account, "Everyone"), "Expected Everyone, got %s\n", account); ok(!lstrcmpiA(domain, sid_dom), "Expected %s, got %s\n", sid_dom, domain); - ok(domain_size == 0, "Expected 0, got %d\n", domain_size); - ok(strlen(domain) == domain_size, "Expected %d, got %d\n", lstrlenA(domain), domain_size); + ok(domain_size == 0, "Expected 0, got %ld\n", domain_size); + ok(strlen(domain) == domain_size, "Expected %d, got %ld\n", lstrlenA(domain), domain_size); ok(sid_use == SidTypeWellKnownGroup, "Expected SidTypeWellKnownGroup (%d), got %d\n", SidTypeWellKnownGroup, sid_use); domain_size = domain_save; } @@ -2600,9 +2600,9 @@ static void test_LookupAccountName(void) ret = LookupAccountNameA(NULL, user_name, NULL, &sid_size, domain, &domain_size, &sid_use); ok(!ret, "Expected 0, got %d\n", ret); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(sid_size == sid_save, "Expected %d, got %d\n", sid_save, sid_size); - ok(domain_size == domain_save, "Expected %d, got %d\n", domain_save, domain_size); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(sid_size == sid_save, "Expected %ld, got %ld\n", sid_save, sid_size); + ok(domain_size == domain_save, "Expected %ld, got %ld\n", domain_save, domain_size); /* try cchReferencedDomainName - 1 */ SetLastError(0xdeadbeef); @@ -2610,9 +2610,9 @@ static void test_LookupAccountName(void) ret = LookupAccountNameA(NULL, user_name, NULL, &sid_size, domain, &domain_size, &sid_use); ok(!ret, "Expected 0, got %d\n", ret); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(sid_size == sid_save, "Expected %d, got %d\n", sid_save, sid_size); - ok(domain_size == domain_save, "Expected %d, got %d\n", domain_save, domain_size); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(sid_size == sid_save, "Expected %ld, got %ld\n", sid_save, sid_size); + ok(domain_size == domain_save, "Expected %ld, got %ld\n", domain_save, domain_size); /* NULL ReferencedDomainName with zero domain name size */ SetLastError(0xdeadbeef); @@ -2620,9 +2620,9 @@ static void test_LookupAccountName(void) ret = LookupAccountNameA(NULL, user_name, psid, &sid_size, NULL, &domain_size, &sid_use); ok(!ret, "Expected 0, got %d\n", ret); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(sid_size == sid_save, "Expected %d, got %d\n", sid_save, sid_size); - ok(domain_size == domain_save, "Expected %d, got %d\n", domain_save, domain_size); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(sid_size == sid_save, "Expected %ld, got %ld\n", sid_save, sid_size); + ok(domain_size == domain_save, "Expected %ld, got %ld\n", domain_save, domain_size); HeapFree(GetProcessHeap(), 0, psid); HeapFree(GetProcessHeap(), 0, domain); @@ -2639,7 +2639,7 @@ static void test_LookupAccountName(void) { ok(!ret, "Expected 0, got %d\n", ret); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); ok(sid_size != 0, "Expected non-zero sid size\n"); ok(domain_size != 0, "Expected non-zero domain size\n"); ok(sid_use == (SID_NAME_USE)0xcafebabe, "Expected 0xcafebabe, got %d\n", sid_use); @@ -2668,9 +2668,9 @@ static void test_LookupAccountName(void) ok(!ret, "Expected 0, got %d\n", ret); ok(GetLastError() == ERROR_NONE_MAPPED || broken(GetLastError() == ERROR_TRUSTED_RELATIONSHIP_FAILURE), - "Expected ERROR_NONE_MAPPED, got %d\n", GetLastError()); - ok(sid_size == 0, "Expected 0, got %d\n", sid_size); - ok(domain_size == 0, "Expected 0, got %d\n", domain_size); + "Expected ERROR_NONE_MAPPED, got %ld\n", GetLastError()); + ok(sid_size == 0, "Expected 0, got %ld\n", sid_size); + ok(domain_size == 0, "Expected 0, got %ld\n", domain_size); /* try an invalid system name */ SetLastError(0xdeadbeef); @@ -2679,9 +2679,9 @@ static void test_LookupAccountName(void) ret = LookupAccountNameA("deepthought", NULL, NULL, &sid_size, NULL, &domain_size, &sid_use); ok(!ret, "Expected 0, got %d\n", ret); ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR /* Vista */, - "Expected RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR, got %d\n", GetLastError()); - ok(sid_size == 0, "Expected 0, got %d\n", sid_size); - ok(domain_size == 0, "Expected 0, got %d\n", domain_size); + "Expected RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR, got %ld\n", GetLastError()); + ok(sid_size == 0, "Expected 0, got %ld\n", sid_size); + ok(domain_size == 0, "Expected 0, got %ld\n", domain_size); /* try with the computer name as the account name */ domain_size = sizeof(computer_name); @@ -2693,13 +2693,13 @@ static void test_LookupAccountName(void) GetLastError() == ERROR_NONE_MAPPED /* in a domain */ || broken(GetLastError() == ERROR_TRUSTED_DOMAIN_FAILURE) || broken(GetLastError() == ERROR_TRUSTED_RELATIONSHIP_FAILURE)), - "LookupAccountNameA failed: %d\n", GetLastError()); + "LookupAccountNameA failed: %ld\n", GetLastError()); if (GetLastError() == ERROR_INSUFFICIENT_BUFFER) { psid = HeapAlloc(GetProcessHeap(), 0, sid_size); domain = HeapAlloc(GetProcessHeap(), 0, domain_size); ret = LookupAccountNameA(NULL, computer_name, psid, &sid_size, domain, &domain_size, &sid_use); - ok(ret, "LookupAccountNameA failed: %d\n", GetLastError()); + ok(ret, "LookupAccountNameA failed: %ld\n", GetLastError()); ok(sid_use == SidTypeDomain || (sid_use == SidTypeUser && ! strcmp(computer_name, user_name)), "expected SidTypeDomain for %s, got %d\n", computer_name, sid_use); HeapFree(GetProcessHeap(), 0, domain); @@ -2767,7 +2767,7 @@ static void test_security_descriptor(void) SetLastError(0xdeadbeef); size = 5; expect_eq(MakeSelfRelativeSD(&sd, buf, &size), FALSE, BOOL, "%d"); - expect_eq(GetLastError(), ERROR_INSUFFICIENT_BUFFER, DWORD, "%u"); + expect_eq(GetLastError(), (DWORD)ERROR_INSUFFICIENT_BUFFER, DWORD, "%lu"); ok(size > 5, "Size not increased\n"); if (size <= 8192) { @@ -2792,17 +2792,17 @@ static void test_security_descriptor(void) "O:SYG:S-1-5-21-93476-23408-4576D:(A;NP;GAGXGWGR;;;SU)(A;IOID;CCDC;;;SU)" "(D;OICI;0xffffffff;;;S-1-5-21-93476-23408-4576)S:(AU;OICINPIOIDSAFA;CCDCLCSWRPRC;;;SU)" "(AU;NPSA;0x12019f;;;SU)", SDDL_REVISION_1, (void **)&sd_rel, NULL); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); size = 0; ret = MakeSelfRelativeSD(sd_rel, NULL, &size); - todo_wine ok(!ret && GetLastError() == ERROR_BAD_DESCRIPTOR_FORMAT, "got %u\n", GetLastError()); + todo_wine ok(!ret && GetLastError() == ERROR_BAD_DESCRIPTOR_FORMAT, "got %lu\n", GetLastError()); /* convert to absolute form */ size = size_dacl = size_sacl = size_owner = size_group = 0; ret = MakeAbsoluteSD(sd_rel, NULL, &size, NULL, &size_dacl, NULL, &size_sacl, NULL, &size_owner, NULL, &size_group); - ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %u\n", GetLastError()); + ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %lu\n", GetLastError()); sd_abs = HeapAlloc(GetProcessHeap(), 0, size + size_dacl + size_sacl + size_owner + size_group); dacl = (PACL)(sd_abs + 1); @@ -2811,18 +2811,18 @@ static void test_security_descriptor(void) group = (PSID)((char *)owner + size_owner); ret = MakeAbsoluteSD(sd_rel, sd_abs, &size, dacl, &size_dacl, sacl, &size_sacl, owner, &size_owner, group, &size_group); - ok(ret, "got %u\n", GetLastError()); + ok(ret, "got %lu\n", GetLastError()); size = 0; ret = MakeSelfRelativeSD(sd_abs, NULL, &size); - ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %u\n", GetLastError()); - ok(size == 184, "got %u\n", size); + ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %lu\n", GetLastError()); + ok(size == 184, "got %lu\n", size); size += 4; sd_rel2 = HeapAlloc(GetProcessHeap(), 0, size); ret = MakeSelfRelativeSD(sd_abs, sd_rel2, &size); - ok(ret, "got %u\n", GetLastError()); - ok(size == 188, "got %u\n", size); + ok(ret, "got %lu\n", GetLastError()); + ok(size == 188, "got %lu\n", size); HeapFree(GetProcessHeap(), 0, sd_abs); HeapFree(GetProcessHeap(), 0, sd_rel2); @@ -2845,14 +2845,14 @@ static void test_granted_access(HANDLE handle, ACCESS_MASK access, status = pNtQueryObject( handle, ObjectBasicInformation, &obj_info, sizeof(obj_info), NULL ); - ok_(__FILE__, line)(!status, "NtQueryObject with err: %08x\n", status); + ok_(__FILE__, line)(!status, "NtQueryObject with err: %08lx\n", status); if (alt) ok_(__FILE__, line)(obj_info.GrantedAccess == access || - obj_info.GrantedAccess == alt, "Granted access should be 0x%08x " - "or 0x%08x, instead of 0x%08x\n", access, alt, obj_info.GrantedAccess); + obj_info.GrantedAccess == alt, "Granted access should be 0x%08lx " + "or 0x%08lx, instead of 0x%08lx\n", access, alt, obj_info.GrantedAccess); else ok_(__FILE__, line)(obj_info.GrantedAccess == access, "Granted access should " - "be 0x%08x, instead of 0x%08x\n", access, obj_info.GrantedAccess); + "be 0x%08lx, instead of 0x%08lx\n", access, obj_info.GrantedAccess); } #define CHECK_SET_SECURITY(o,i,e) \ @@ -2863,10 +2863,10 @@ static void test_granted_access(HANDLE handle, ACCESS_MASK access, res_ = SetKernelObjectSecurity( o, i, SecurityDescriptor ); \ err = GetLastError(); \ if (e == ERROR_SUCCESS) \ - ok(res_, "SetKernelObjectSecurity failed with %d\n", err); \ + ok(res_, "SetKernelObjectSecurity failed with %ld\n", err); \ else \ ok(!res_ && err == e, "SetKernelObjectSecurity should have failed " \ - "with %s, instead of %d\n", #e, err); \ + "with %s, instead of %ld\n", #e, err); \ }while(0) static void test_process_security(void) @@ -2896,14 +2896,14 @@ static void test_process_security(void) HeapFree(GetProcessHeap(), 0, Acl); return; } - ok(res, "InitializeAcl failed with error %d\n", GetLastError()); + ok(res, "InitializeAcl failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &EveryoneSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); /* get owner from the token we might be running as a user not admin */ res = OpenProcessToken( GetCurrentProcess(), MAXIMUM_ALLOWED, &token ); - ok(res, "OpenProcessToken failed with error %d\n", GetLastError()); + ok(res, "OpenProcessToken failed with error %ld\n", GetLastError()); if (!res) { HeapFree(GetProcessHeap(), 0, Acl); @@ -2913,29 +2913,29 @@ static void test_process_security(void) res = GetTokenInformation( token, TokenOwner, NULL, 0, &size ); ok(!res, "Expected failure, got %d\n", res); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); owner = HeapAlloc(GetProcessHeap(), 0, size); res = GetTokenInformation( token, TokenOwner, owner, size, &size ); - ok(res, "GetTokenInformation failed with error %d\n", GetLastError()); + ok(res, "GetTokenInformation failed with error %ld\n", GetLastError()); AdminSid = owner->Owner; test_sid_str(AdminSid); res = GetTokenInformation( token, TokenPrimaryGroup, NULL, 0, &size ); ok(!res, "Expected failure, got %d\n", res); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); group = HeapAlloc(GetProcessHeap(), 0, size); res = GetTokenInformation( token, TokenPrimaryGroup, group, size, &size ); - ok(res, "GetTokenInformation failed with error %d\n", GetLastError()); + ok(res, "GetTokenInformation failed with error %ld\n", GetLastError()); UsersSid = group->PrimaryGroup; test_sid_str(UsersSid); acc_size = sizeof(account); dom_size = sizeof(domain); ret = LookupAccountSidA( NULL, UsersSid, account, &acc_size, domain, &dom_size, &use ); - ok(ret, "LookupAccountSid failed with %d\n", ret); + ok(ret, "LookupAccountSid failed with %ld\n", ret); ok(use == SidTypeGroup, "expect SidTypeGroup, got %d\n", use); if (PRIMARYLANGID(GetSystemDefaultLangID()) != LANG_ENGLISH) skip("Non-English locale (test with hardcoded 'None')\n"); @@ -2945,11 +2945,11 @@ static void test_process_security(void) res = GetTokenInformation( token, TokenUser, NULL, 0, &size ); ok(!res, "Expected failure, got %d\n", res); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); user = HeapAlloc(GetProcessHeap(), 0, size); res = GetTokenInformation( token, TokenUser, user, size, &size ); - ok(res, "GetTokenInformation failed with error %d\n", GetLastError()); + ok(res, "GetTokenInformation failed with error %ld\n", GetLastError()); UserSid = user->User.Sid; test_sid_str(UserSid); ok(EqualPrefixSid(UsersSid, UserSid), "TokenPrimaryGroup Sid and TokenUser Sid don't match.\n"); @@ -2965,16 +2965,16 @@ static void test_process_security(void) } res = AddAccessDeniedAce(Acl, ACL_REVISION, PROCESS_VM_READ, AdminSid); - ok(res, "AddAccessDeniedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessDeniedAce failed with error %ld\n", GetLastError()); res = AddAccessAllowedAce(Acl, ACL_REVISION, PROCESS_ALL_ACCESS, AdminSid); - ok(res, "AddAccessAllowedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessAllowedAce failed with error %ld\n", GetLastError()); SecurityDescriptor = HeapAlloc(GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH); res = InitializeSecurityDescriptor(SecurityDescriptor, SECURITY_DESCRIPTOR_REVISION); - ok(res, "InitializeSecurityDescriptor failed with error %d\n", GetLastError()); + ok(res, "InitializeSecurityDescriptor failed with error %ld\n", GetLastError()); event = CreateEventA( NULL, TRUE, TRUE, "test_event" ); - ok(event != NULL, "CreateEvent %d\n", GetLastError()); + ok(event != NULL, "CreateEvent %ld\n", GetLastError()); SecurityDescriptor->Revision = 0; CHECK_SET_SECURITY( event, OWNER_SECURITY_INFORMATION, ERROR_UNKNOWN_REVISION ); @@ -2990,17 +2990,17 @@ static void test_process_security(void) /* Set owner and group and dacl */ res = SetSecurityDescriptorOwner(SecurityDescriptor, AdminSid, FALSE); - ok(res, "SetSecurityDescriptorOwner failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorOwner failed with error %ld\n", GetLastError()); CHECK_SET_SECURITY( event, OWNER_SECURITY_INFORMATION, ERROR_SUCCESS ); test_owner_equal( event, AdminSid, __LINE__ ); res = SetSecurityDescriptorGroup(SecurityDescriptor, EveryoneSid, FALSE); - ok(res, "SetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); CHECK_SET_SECURITY( event, GROUP_SECURITY_INFORMATION, ERROR_SUCCESS ); test_group_equal( event, EveryoneSid, __LINE__ ); res = SetSecurityDescriptorDacl(SecurityDescriptor, TRUE, Acl, FALSE); - ok(res, "SetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); CHECK_SET_SECURITY( event, DACL_SECURITY_INFORMATION, ERROR_SUCCESS ); /* setting a dacl should not change the owner or group */ test_owner_equal( event, AdminSid, __LINE__ ); @@ -3009,12 +3009,12 @@ static void test_process_security(void) /* Test again with a different SID in case the previous SID also happens to * be the one that is incorrectly replacing the group. */ res = SetSecurityDescriptorGroup(SecurityDescriptor, UsersSid, FALSE); - ok(res, "SetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); CHECK_SET_SECURITY( event, GROUP_SECURITY_INFORMATION, ERROR_SUCCESS ); test_group_equal( event, UsersSid, __LINE__ ); res = SetSecurityDescriptorDacl(SecurityDescriptor, TRUE, Acl, FALSE); - ok(res, "SetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); CHECK_SET_SECURITY( event, DACL_SECURITY_INFORMATION, ERROR_SUCCESS ); test_group_equal( event, UsersSid, __LINE__ ); @@ -3030,22 +3030,22 @@ static void test_process_security(void) ThreadSecurityDescriptor = HeapAlloc( GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH ); res = InitializeSecurityDescriptor( ThreadSecurityDescriptor, SECURITY_DESCRIPTOR_REVISION ); - ok(res, "InitializeSecurityDescriptor failed with error %d\n", GetLastError()); + ok(res, "InitializeSecurityDescriptor failed with error %ld\n", GetLastError()); ThreadAcl = HeapAlloc( GetProcessHeap(), 0, 256 ); res = InitializeAcl( ThreadAcl, 256, ACL_REVISION ); - ok(res, "InitializeAcl failed with error %d\n", GetLastError()); + ok(res, "InitializeAcl failed with error %ld\n", GetLastError()); res = AddAccessDeniedAce( ThreadAcl, ACL_REVISION, THREAD_SET_THREAD_TOKEN, AdminSid ); - ok(res, "AddAccessDeniedAce failed with error %d\n", GetLastError() ); + ok(res, "AddAccessDeniedAce failed with error %ld\n", GetLastError() ); res = AddAccessAllowedAce( ThreadAcl, ACL_REVISION, THREAD_ALL_ACCESS, AdminSid ); - ok(res, "AddAccessAllowedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessAllowedAce failed with error %ld\n", GetLastError()); res = SetSecurityDescriptorOwner( ThreadSecurityDescriptor, AdminSid, FALSE ); - ok(res, "SetSecurityDescriptorOwner failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorOwner failed with error %ld\n", GetLastError()); res = SetSecurityDescriptorGroup( ThreadSecurityDescriptor, UsersSid, FALSE ); - ok(res, "SetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); res = SetSecurityDescriptorDacl( ThreadSecurityDescriptor, TRUE, ThreadAcl, FALSE ); - ok(res, "SetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(res, "SetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); tsa.nLength = sizeof(tsa); tsa.lpSecurityDescriptor = ThreadSecurityDescriptor; @@ -3053,7 +3053,7 @@ static void test_process_security(void) /* Doesn't matter what ACL say we should get full access for ourselves */ res = CreateProcessA( NULL, buffer, &psa, &tsa, FALSE, 0, NULL, NULL, &startup, &info ); - ok(res, "CreateProcess with err:%d\n", GetLastError()); + ok(res, "CreateProcess with err:%ld\n", GetLastError()); TEST_GRANTED_ACCESS2( info.hProcess, PROCESS_ALL_ACCESS_NT4, STANDARD_RIGHTS_ALL | SPECIFIC_RIGHTS_ALL ); TEST_GRANTED_ACCESS2( info.hThread, THREAD_ALL_ACCESS_NT4, @@ -3080,12 +3080,12 @@ static void test_process_security_child(void) DWORD err; handle = OpenProcess( PROCESS_TERMINATE, FALSE, GetCurrentProcessId() ); - ok(handle != NULL, "OpenProcess(PROCESS_TERMINATE) with err:%d\n", GetLastError()); + ok(handle != NULL, "OpenProcess(PROCESS_TERMINATE) with err:%ld\n", GetLastError()); TEST_GRANTED_ACCESS( handle, PROCESS_TERMINATE ); ret = DuplicateHandle( GetCurrentProcess(), handle, GetCurrentProcess(), &handle1, 0, TRUE, DUPLICATE_SAME_ACCESS ); - ok(ret, "duplicating handle err:%d\n", GetLastError()); + ok(ret, "duplicating handle err:%ld\n", GetLastError()); TEST_GRANTED_ACCESS( handle1, PROCESS_TERMINATE ); CloseHandle( handle1 ); @@ -3095,7 +3095,7 @@ static void test_process_security_child(void) &handle1, PROCESS_ALL_ACCESS, TRUE, 0 ); err = GetLastError(); ok(!ret && err == ERROR_ACCESS_DENIED, "duplicating handle should have failed " - "with STATUS_ACCESS_DENIED, instead of err:%d\n", err); + "with STATUS_ACCESS_DENIED, instead of err:%ld\n", err); CloseHandle( handle ); @@ -3108,7 +3108,7 @@ static void test_process_security_child(void) /* Documented privilege elevation */ ret = DuplicateHandle( GetCurrentProcess(), GetCurrentProcess(), GetCurrentProcess(), &handle, 0, TRUE, DUPLICATE_SAME_ACCESS ); - ok(ret, "duplicating handle err:%d\n", GetLastError()); + ok(ret, "duplicating handle err:%ld\n", GetLastError()); TEST_GRANTED_ACCESS2( handle, PROCESS_ALL_ACCESS_NT4, STANDARD_RIGHTS_ALL | SPECIFIC_RIGHTS_ALL ); @@ -3117,19 +3117,19 @@ static void test_process_security_child(void) /* Same only explicitly asking for all access rights */ ret = DuplicateHandle( GetCurrentProcess(), GetCurrentProcess(), GetCurrentProcess(), &handle, PROCESS_ALL_ACCESS, TRUE, 0 ); - ok(ret, "duplicating handle err:%d\n", GetLastError()); + ok(ret, "duplicating handle err:%ld\n", GetLastError()); TEST_GRANTED_ACCESS2( handle, PROCESS_ALL_ACCESS_NT4, PROCESS_ALL_ACCESS | PROCESS_QUERY_LIMITED_INFORMATION ); ret = DuplicateHandle( GetCurrentProcess(), handle, GetCurrentProcess(), &handle1, PROCESS_VM_READ, TRUE, 0 ); - ok(ret, "duplicating handle err:%d\n", GetLastError()); + ok(ret, "duplicating handle err:%ld\n", GetLastError()); TEST_GRANTED_ACCESS( handle1, PROCESS_VM_READ ); CloseHandle( handle1 ); CloseHandle( handle ); /* Test thread security */ handle = OpenThread( THREAD_TERMINATE, FALSE, GetCurrentThreadId() ); - ok(handle != NULL, "OpenThread(THREAD_TERMINATE) with err:%d\n", GetLastError()); + ok(handle != NULL, "OpenThread(THREAD_TERMINATE) with err:%ld\n", GetLastError()); TEST_GRANTED_ACCESS( handle, PROCESS_TERMINATE ); CloseHandle( handle ); @@ -3161,47 +3161,47 @@ static void test_impersonation_level(void) win_skip("ImpersonateSelf is not implemented\n"); return; } - ok(ret, "ImpersonateSelf(SecurityAnonymous) failed with error %d\n", GetLastError()); + ok(ret, "ImpersonateSelf(SecurityAnonymous) failed with error %ld\n", GetLastError()); ret = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY_SOURCE | TOKEN_IMPERSONATE | TOKEN_ADJUST_DEFAULT, TRUE, &Token); ok(!ret, "OpenThreadToken should have failed\n"); error = GetLastError(); - ok(error == ERROR_CANT_OPEN_ANONYMOUS, "OpenThreadToken on anonymous token should have returned ERROR_CANT_OPEN_ANONYMOUS instead of %d\n", error); + ok(error == ERROR_CANT_OPEN_ANONYMOUS, "OpenThreadToken on anonymous token should have returned ERROR_CANT_OPEN_ANONYMOUS instead of %ld\n", error); /* can't perform access check when opening object against an anonymous impersonation token */ todo_wine { error = RegOpenKeyExA(HKEY_CURRENT_USER, "Software", 0, KEY_READ, &hkey); ok(error == ERROR_INVALID_HANDLE || error == ERROR_CANT_OPEN_ANONYMOUS || error == ERROR_BAD_IMPERSONATION_LEVEL, - "RegOpenKeyEx failed with %d\n", error); + "RegOpenKeyEx failed with %ld\n", error); } RevertToSelf(); ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE, &ProcessToken); - ok(ret, "OpenProcessToken failed with error %d\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %ld\n", GetLastError()); ret = pDuplicateTokenEx(ProcessToken, TOKEN_QUERY | TOKEN_DUPLICATE | TOKEN_IMPERSONATE, NULL, SecurityAnonymous, TokenImpersonation, &Token); - ok(ret, "DuplicateTokenEx failed with error %d\n", GetLastError()); + ok(ret, "DuplicateTokenEx failed with error %ld\n", GetLastError()); /* can't increase the impersonation level */ ret = DuplicateToken(Token, SecurityIdentification, &Token2); error = GetLastError(); ok(!ret && error == ERROR_BAD_IMPERSONATION_LEVEL, - "Duplicating a token and increasing the impersonation level should have failed with ERROR_BAD_IMPERSONATION_LEVEL instead of %d\n", error); + "Duplicating a token and increasing the impersonation level should have failed with ERROR_BAD_IMPERSONATION_LEVEL instead of %ld\n", error); /* we can query anything from an anonymous token, including the user */ ret = GetTokenInformation(Token, TokenUser, NULL, 0, &Size); error = GetLastError(); - ok(!ret && error == ERROR_INSUFFICIENT_BUFFER, "GetTokenInformation(TokenUser) should have failed with ERROR_INSUFFICIENT_BUFFER instead of %d\n", error); + ok(!ret && error == ERROR_INSUFFICIENT_BUFFER, "GetTokenInformation(TokenUser) should have failed with ERROR_INSUFFICIENT_BUFFER instead of %ld\n", error); User = HeapAlloc(GetProcessHeap(), 0, Size); ret = GetTokenInformation(Token, TokenUser, User, Size, &Size); - ok(ret, "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); HeapFree(GetProcessHeap(), 0, User); /* PrivilegeCheck fails with SecurityAnonymous level */ ret = GetTokenInformation(Token, TokenPrivileges, NULL, 0, &Size); error = GetLastError(); - ok(!ret && error == ERROR_INSUFFICIENT_BUFFER, "GetTokenInformation(TokenPrivileges) should have failed with ERROR_INSUFFICIENT_BUFFER instead of %d\n", error); + ok(!ret && error == ERROR_INSUFFICIENT_BUFFER, "GetTokenInformation(TokenPrivileges) should have failed with ERROR_INSUFFICIENT_BUFFER instead of %ld\n", error); Privileges = HeapAlloc(GetProcessHeap(), 0, Size); ret = GetTokenInformation(Token, TokenPrivileges, Privileges, Size, &Size); - ok(ret, "GetTokenInformation(TokenPrivileges) failed with error %d\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenPrivileges) failed with error %ld\n", GetLastError()); PrivilegeSet = HeapAlloc(GetProcessHeap(), 0, FIELD_OFFSET(PRIVILEGE_SET, Privilege[Privileges->PrivilegeCount])); PrivilegeSet->PrivilegeCount = Privileges->PrivilegeCount; @@ -3211,35 +3211,35 @@ static void test_impersonation_level(void) ret = PrivilegeCheck(Token, PrivilegeSet, &AccessGranted); error = GetLastError(); - ok(!ret && error == ERROR_BAD_IMPERSONATION_LEVEL, "PrivilegeCheck for SecurityAnonymous token should have failed with ERROR_BAD_IMPERSONATION_LEVEL instead of %d\n", error); + ok(!ret && error == ERROR_BAD_IMPERSONATION_LEVEL, "PrivilegeCheck for SecurityAnonymous token should have failed with ERROR_BAD_IMPERSONATION_LEVEL instead of %ld\n", error); CloseHandle(Token); ret = ImpersonateSelf(SecurityIdentification); - ok(ret, "ImpersonateSelf(SecurityIdentification) failed with error %d\n", GetLastError()); + ok(ret, "ImpersonateSelf(SecurityIdentification) failed with error %ld\n", GetLastError()); ret = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY_SOURCE | TOKEN_IMPERSONATE | TOKEN_ADJUST_DEFAULT, TRUE, &Token); - ok(ret, "OpenThreadToken failed with error %d\n", GetLastError()); + ok(ret, "OpenThreadToken failed with error %ld\n", GetLastError()); /* can't perform access check when opening object against an identification impersonation token */ error = RegOpenKeyExA(HKEY_CURRENT_USER, "Software", 0, KEY_READ, &hkey); todo_wine { ok(error == ERROR_INVALID_HANDLE || error == ERROR_BAD_IMPERSONATION_LEVEL || error == ERROR_ACCESS_DENIED, - "RegOpenKeyEx should have failed with ERROR_INVALID_HANDLE, ERROR_BAD_IMPERSONATION_LEVEL or ERROR_ACCESS_DENIED instead of %d\n", error); + "RegOpenKeyEx should have failed with ERROR_INVALID_HANDLE, ERROR_BAD_IMPERSONATION_LEVEL or ERROR_ACCESS_DENIED instead of %ld\n", error); } ret = PrivilegeCheck(Token, PrivilegeSet, &AccessGranted); - ok(ret, "PrivilegeCheck for SecurityIdentification failed with error %d\n", GetLastError()); + ok(ret, "PrivilegeCheck for SecurityIdentification failed with error %ld\n", GetLastError()); CloseHandle(Token); RevertToSelf(); ret = ImpersonateSelf(SecurityImpersonation); - ok(ret, "ImpersonateSelf(SecurityImpersonation) failed with error %d\n", GetLastError()); + ok(ret, "ImpersonateSelf(SecurityImpersonation) failed with error %ld\n", GetLastError()); ret = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY_SOURCE | TOKEN_IMPERSONATE | TOKEN_ADJUST_DEFAULT, TRUE, &Token); - ok(ret, "OpenThreadToken failed with error %d\n", GetLastError()); + ok(ret, "OpenThreadToken failed with error %ld\n", GetLastError()); error = RegOpenKeyExA(HKEY_CURRENT_USER, "Software", 0, KEY_READ, &hkey); - ok(error == ERROR_SUCCESS, "RegOpenKeyEx should have succeeded instead of failing with %d\n", error); + ok(error == ERROR_SUCCESS, "RegOpenKeyEx should have succeeded instead of failing with %ld\n", error); RegCloseKey(hkey); ret = PrivilegeCheck(Token, PrivilegeSet, &AccessGranted); - ok(ret, "PrivilegeCheck for SecurityImpersonation failed with error %d\n", GetLastError()); + ok(ret, "PrivilegeCheck for SecurityImpersonation failed with error %ld\n", GetLastError()); RevertToSelf(); CloseHandle(Token); @@ -3272,7 +3272,7 @@ static void test_SetEntriesInAclW(void) win_skip("SetEntriesInAclW is not implemented\n"); return; } - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl == NULL || broken(NewAcl != NULL), /* NT4 */ "NewAcl=%p, expected NULL\n", NewAcl); @@ -3286,17 +3286,17 @@ static void test_SetEntriesInAclW(void) HeapFree(GetProcessHeap(), 0, OldAcl); return; } - ok(res, "InitializeAcl failed with error %d\n", GetLastError()); + ok(res, "InitializeAcl failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &EveryoneSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthNT, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS, 0, 0, 0, 0, 0, 0, &UsersSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AddAccessAllowedAce(OldAcl, ACL_REVISION, KEY_READ, UsersSid); - ok(res, "AddAccessAllowedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessAllowedAce failed with error %ld\n", GetLastError()); ExplicitAccess.grfAccessPermissions = KEY_WRITE; ExplicitAccess.grfAccessMode = GRANT_ACCESS; @@ -3307,7 +3307,7 @@ static void test_SetEntriesInAclW(void) ExplicitAccess.Trustee.MultipleTrusteeOperation = 0xDEADBEEF; ExplicitAccess.Trustee.pMultipleTrustee = (PVOID)0xDEADBEEF; res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3315,7 +3315,7 @@ static void test_SetEntriesInAclW(void) ExplicitAccess.Trustee.pMultipleTrustee = NULL; ExplicitAccess.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE; res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3328,7 +3328,7 @@ static void test_SetEntriesInAclW(void) ExplicitAccess.Trustee.TrusteeForm = TRUSTEE_IS_NAME; ExplicitAccess.Trustee.ptstrName = (LPWSTR)wszEveryone; res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3336,7 +3336,7 @@ static void test_SetEntriesInAclW(void) res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); ok(res == ERROR_INVALID_PARAMETER || broken(res == ERROR_NOT_SUPPORTED), /* NT4 */ - "SetEntriesInAclW failed: %u\n", res); + "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl == NULL || broken(NewAcl != NULL), /* NT4 */ "returned acl wasn't NULL: %p\n", NewAcl); @@ -3346,7 +3346,7 @@ static void test_SetEntriesInAclW(void) res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); ok(res == ERROR_INVALID_PARAMETER || broken(res == ERROR_NOT_SUPPORTED), /* NT4 */ - "SetEntriesInAclW failed: %u\n", res); + "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl == NULL || broken(NewAcl != NULL), /* NT4 */ "returned acl wasn't NULL: %p\n", NewAcl); @@ -3354,7 +3354,7 @@ static void test_SetEntriesInAclW(void) ExplicitAccess.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE; ExplicitAccess.grfAccessMode = SET_ACCESS; res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); } @@ -3362,7 +3362,7 @@ static void test_SetEntriesInAclW(void) ExplicitAccess.Trustee.TrusteeForm = TRUSTEE_IS_NAME; ExplicitAccess.Trustee.ptstrName = (LPWSTR)wszCurrentUser; res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3370,7 +3370,7 @@ static void test_SetEntriesInAclW(void) ExplicitAccess.Trustee.TrusteeForm = TRUSTEE_IS_SID; ExplicitAccess.Trustee.ptstrName = UsersSid; res = pSetEntriesInAclW(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3397,7 +3397,7 @@ static void test_SetEntriesInAclA(void) win_skip("SetEntriesInAclA is not implemented\n"); return; } - ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl == NULL || broken(NewAcl != NULL), /* NT4 */ "NewAcl=%p, expected NULL\n", NewAcl); @@ -3411,17 +3411,17 @@ static void test_SetEntriesInAclA(void) HeapFree(GetProcessHeap(), 0, OldAcl); return; } - ok(res, "InitializeAcl failed with error %d\n", GetLastError()); + ok(res, "InitializeAcl failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &EveryoneSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid( &SIDAuthNT, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS, 0, 0, 0, 0, 0, 0, &UsersSid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AddAccessAllowedAce(OldAcl, ACL_REVISION, KEY_READ, UsersSid); - ok(res, "AddAccessAllowedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessAllowedAce failed with error %ld\n", GetLastError()); ExplicitAccess.grfAccessPermissions = KEY_WRITE; ExplicitAccess.grfAccessMode = GRANT_ACCESS; @@ -3432,7 +3432,7 @@ static void test_SetEntriesInAclA(void) ExplicitAccess.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE; ExplicitAccess.Trustee.pMultipleTrustee = NULL; res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3440,7 +3440,7 @@ static void test_SetEntriesInAclA(void) ExplicitAccess.Trustee.pMultipleTrustee = NULL; ExplicitAccess.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE; res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3453,7 +3453,7 @@ static void test_SetEntriesInAclA(void) ExplicitAccess.Trustee.TrusteeForm = TRUSTEE_IS_NAME; ExplicitAccess.Trustee.ptstrName = (LPSTR)szEveryone; res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3461,7 +3461,7 @@ static void test_SetEntriesInAclA(void) res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); ok(res == ERROR_INVALID_PARAMETER || broken(res == ERROR_NOT_SUPPORTED), /* NT4 */ - "SetEntriesInAclA failed: %u\n", res); + "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl == NULL || broken(NewAcl != NULL), /* NT4 */ "returned acl wasn't NULL: %p\n", NewAcl); @@ -3471,7 +3471,7 @@ static void test_SetEntriesInAclA(void) res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); ok(res == ERROR_INVALID_PARAMETER || broken(res == ERROR_NOT_SUPPORTED), /* NT4 */ - "SetEntriesInAclA failed: %u\n", res); + "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl == NULL || broken(NewAcl != NULL), /* NT4 */ "returned acl wasn't NULL: %p\n", NewAcl); @@ -3479,7 +3479,7 @@ static void test_SetEntriesInAclA(void) ExplicitAccess.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE; ExplicitAccess.grfAccessMode = SET_ACCESS; res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); } @@ -3487,7 +3487,7 @@ static void test_SetEntriesInAclA(void) ExplicitAccess.Trustee.TrusteeForm = TRUSTEE_IS_NAME; ExplicitAccess.Trustee.ptstrName = (LPSTR)szCurrentUser; res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3495,7 +3495,7 @@ static void test_SetEntriesInAclA(void) ExplicitAccess.Trustee.TrusteeForm = TRUSTEE_IS_SID; ExplicitAccess.Trustee.ptstrName = UsersSid; res = SetEntriesInAclA(1, &ExplicitAccess, OldAcl, &NewAcl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclA failed: %lu\n", res); ok(NewAcl != NULL, "returned acl was NULL\n"); LocalFree(NewAcl); @@ -3515,7 +3515,7 @@ static void get_nt_pathW(const char *name, UNICODE_STRING *nameW) pRtlInitAnsiString(&str, name); status = pRtlAnsiStringToUnicodeString(&strW, &str, TRUE); - ok(!status, "RtlAnsiStringToUnicodeString failed with %08x\n", status); + ok(!status, "RtlAnsiStringToUnicodeString failed with %08lx\n", status); ret = pRtlDosPathNameToNtPathName_U(strW.Buffer, nameW, NULL, NULL); ok(ret, "RtlDosPathNameToNtPathName_U failed\n"); @@ -3535,7 +3535,7 @@ static void test_inherited_dacl(PACL dacl, PSID admin_sid, PSID user_sid, DWORD todo_wine_if (todo_count) ok_(__FILE__, line)(acl_size.AceCount == 2, - "GetAclInformation returned unexpected entry count (%d != 2)\n", + "GetAclInformation returned unexpected entry count (%ld != 2)\n", acl_size.AceCount); if (acl_size.AceCount > 0) @@ -3549,11 +3549,11 @@ static void test_inherited_dacl(PACL dacl, PSID admin_sid, PSID user_sid, DWORD todo_wine_if (todo_flags) ok_(__FILE__, line)(((ACE_HEADER *)ace)->AceFlags == flags, - "Current User ACE has unexpected flags (0x%x != 0x%x)\n", + "Current User ACE has unexpected flags (0x%x != 0x%lx)\n", ((ACE_HEADER *)ace)->AceFlags, flags); ok_(__FILE__, line)(ace->Mask == mask, - "Current User ACE has unexpected mask (0x%x != 0x%x)\n", + "Current User ACE has unexpected mask (0x%lx != 0x%lx)\n", ace->Mask, mask); } if (acl_size.AceCount > 1) @@ -3567,11 +3567,11 @@ static void test_inherited_dacl(PACL dacl, PSID admin_sid, PSID user_sid, DWORD todo_wine_if (todo_flags) ok_(__FILE__, line)(((ACE_HEADER *)ace)->AceFlags == flags, - "Administators Group ACE has unexpected flags (0x%x != 0x%x)\n", + "Administators Group ACE has unexpected flags (0x%x != 0x%lx)\n", ((ACE_HEADER *)ace)->AceFlags, flags); ok_(__FILE__, line)(ace->Mask == mask, - "Administators Group ACE has unexpected mask (0x%x != 0x%x)\n", + "Administators Group ACE has unexpected mask (0x%lx != 0x%lx)\n", ace->Mask, mask); } } @@ -3615,10 +3615,10 @@ static void test_CreateDirectoryA(void) } bret = GetTokenInformation(token, TokenUser, NULL, 0, &user_size); ok(!bret && (GetLastError() == ERROR_INSUFFICIENT_BUFFER), - "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); user = HeapAlloc(GetProcessHeap(), 0, user_size); bret = GetTokenInformation(token, TokenUser, user, user_size, &user_size); - ok(bret, "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + ok(bret, "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); CloseHandle( token ); user_sid = ((TOKEN_USER *)user)->User.Sid; @@ -3642,7 +3642,7 @@ static void test_CreateDirectoryA(void) GetTempPathA(MAX_PATH, tmpdir); lstrcatA(tmpdir, "Please Remove Me"); bret = CreateDirectoryA(tmpdir, &sa); - ok(bret == TRUE, "CreateDirectoryA(%s) failed err=%d\n", tmpdir, GetLastError()); + ok(bret == TRUE, "CreateDirectoryA(%s) failed err=%ld\n", tmpdir, GetLastError()); HeapFree(GetProcessHeap(), 0, pDacl); SetLastError(0xdeadbeef); @@ -3654,7 +3654,7 @@ static void test_CreateDirectoryA(void) win_skip("GetNamedSecurityInfoA is not implemented\n"); goto done; } - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); test_inherited_dacl(pDacl, admin_sid, user_sid, OBJECT_INHERIT_ACE|CONTAINER_INHERIT_ACE, 0x1f01ff, FALSE, TRUE, FALSE, __LINE__); LocalFree(pSD); @@ -3665,7 +3665,7 @@ static void test_CreateDirectoryA(void) hTemp = CreateFileA(tmpfile, GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_NEW, FILE_FLAG_DELETE_ON_CLOSE, NULL); - ok(hTemp != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError()); + ok(hTemp != INVALID_HANDLE_VALUE, "CreateFile error %lu\n", GetLastError()); error = pGetNamedSecurityInfoA(tmpfile, SE_FILE_OBJECT, OWNER_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, @@ -3694,16 +3694,16 @@ static void test_CreateDirectoryA(void) sa.bInheritHandle = TRUE; hTemp = CreateFileA(tmpfile, GENERIC_WRITE, FILE_SHARE_READ, &sa, CREATE_NEW, FILE_FLAG_DELETE_ON_CLOSE, NULL); - ok(hTemp != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError()); + ok(hTemp != INVALID_HANDLE_VALUE, "CreateFile error %lu\n", GetLastError()); HeapFree(GetProcessHeap(), 0, pDacl); error = GetSecurityInfo(hTemp, SE_FILE_OBJECT, OWNER_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, (PSID *)&owner, NULL, &pDacl, NULL, &pSD); - ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %d\n", error); + ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %ld\n", error); bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); ok(bret, "GetAclInformation failed\n"); todo_wine - ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%d != 0).\n", + ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%ld != 0).\n", acl_size.AceCount); LocalFree(pSD); @@ -3711,13 +3711,13 @@ static void test_CreateDirectoryA(void) OWNER_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, (PSID *)&owner, NULL, &pDacl, NULL, &pSD); todo_wine - ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %d\n", error); + ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %ld\n", error); if (error == ERROR_SUCCESS) { bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); ok(bret, "GetAclInformation failed\n"); todo_wine - ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%d != 0).\n", + ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%ld != 0).\n", acl_size.AceCount); LocalFree(pSD); } @@ -3737,7 +3737,7 @@ static void test_CreateDirectoryA(void) status = pNtCreateFile(&hTemp, GENERIC_WRITE | DELETE, &attr, &io, NULL, 0, FILE_SHARE_READ, FILE_CREATE, FILE_DELETE_ON_CLOSE, NULL, 0); - ok(!status, "NtCreateFile failed with %08x\n", status); + ok(!status, "NtCreateFile failed with %08lx\n", status); pRtlFreeUnicodeString(&tmpfileW); error = pGetNamedSecurityInfoA(tmpfile, SE_FILE_OBJECT, @@ -3772,17 +3772,17 @@ static void test_CreateDirectoryA(void) status = pNtCreateFile(&hTemp, GENERIC_WRITE | DELETE, &attr, &io, NULL, 0, FILE_SHARE_READ, FILE_CREATE, FILE_DELETE_ON_CLOSE, NULL, 0); - ok(!status, "NtCreateFile failed with %08x\n", status); + ok(!status, "NtCreateFile failed with %08lx\n", status); pRtlFreeUnicodeString(&tmpfileW); HeapFree(GetProcessHeap(), 0, pDacl); error = GetSecurityInfo(hTemp, SE_FILE_OBJECT, OWNER_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, (PSID *)&owner, NULL, &pDacl, NULL, &pSD); - ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %d\n", error); + ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %ld\n", error); bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); ok(bret, "GetAclInformation failed\n"); todo_wine - ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%d != 0).\n", + ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%ld != 0).\n", acl_size.AceCount); LocalFree(pSD); @@ -3790,13 +3790,13 @@ static void test_CreateDirectoryA(void) OWNER_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, (PSID *)&owner, NULL, &pDacl, NULL, &pSD); todo_wine - ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %d\n", error); + ok(error == ERROR_SUCCESS, "GetNamedSecurityInfo failed with error %ld\n", error); if (error == ERROR_SUCCESS) { bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); ok(bret, "GetAclInformation failed\n"); todo_wine - ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%d != 0).\n", + ok(acl_size.AceCount == 0, "GetAclInformation returned unexpected entry count (%ld != 0).\n", acl_size.AceCount); LocalFree(pSD); } @@ -3857,15 +3857,15 @@ static void test_GetNamedSecurityInfoA(void) } bret = GetTokenInformation(token, TokenUser, NULL, 0, &user_size); ok(!bret && (GetLastError() == ERROR_INSUFFICIENT_BUFFER), - "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); user = HeapAlloc(GetProcessHeap(), 0, user_size); bret = GetTokenInformation(token, TokenUser, user, user_size, &user_size); - ok(bret, "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + ok(bret, "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); CloseHandle( token ); user_sid = ((TOKEN_USER *)user)->User.Sid; bret = GetWindowsDirectoryA(windows_dir, MAX_PATH); - ok(bret, "GetWindowsDirectory failed with error %d\n", GetLastError()); + ok(bret, "GetWindowsDirectory failed with error %ld\n", GetLastError()); SetLastError(0xdeadbeef); error = pGetNamedSecurityInfoA(windows_dir, SE_FILE_OBJECT, @@ -3877,23 +3877,23 @@ static void test_GetNamedSecurityInfoA(void) HeapFree(GetProcessHeap(), 0, user); return; } - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); bret = GetSecurityDescriptorControl(pSD, &control, &revision); - ok(bret, "GetSecurityDescriptorControl failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorControl failed with error %ld\n", GetLastError()); ok((control & (SE_SELF_RELATIVE|SE_DACL_PRESENT)) == (SE_SELF_RELATIVE|SE_DACL_PRESENT) || broken((control & (SE_SELF_RELATIVE|SE_DACL_PRESENT)) == SE_DACL_PRESENT), /* NT4 */ "control (0x%x) doesn't have (SE_SELF_RELATIVE|SE_DACL_PRESENT) flags set\n", control); - ok(revision == SECURITY_DESCRIPTOR_REVISION1, "revision was %d instead of 1\n", revision); + ok(revision == SECURITY_DESCRIPTOR_REVISION1, "revision was %ld instead of 1\n", revision); isNT4 = (control & (SE_SELF_RELATIVE|SE_DACL_PRESENT)) == SE_DACL_PRESENT; bret = GetSecurityDescriptorOwner(pSD, &owner, &owner_defaulted); - ok(bret, "GetSecurityDescriptorOwner failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorOwner failed with error %ld\n", GetLastError()); ok(owner != NULL, "owner should not be NULL\n"); bret = GetSecurityDescriptorGroup(pSD, &group, &group_defaulted); - ok(bret, "GetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); ok(group != NULL, "group should not be NULL\n"); LocalFree(pSD); @@ -3908,24 +3908,24 @@ static void test_GetNamedSecurityInfoA(void) error = pGetNamedSecurityInfoA(windows_dir, SE_FILE_OBJECT,DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, NULL); - ok(error==ERROR_INVALID_PARAMETER, "GetNamedSecurityInfo failed with error %d\n", error); + ok(error==ERROR_INVALID_PARAMETER, "GetNamedSecurityInfo failed with error %ld\n", error); pDacl = NULL; error = pGetNamedSecurityInfoA(windows_dir, SE_FILE_OBJECT,DACL_SECURITY_INFORMATION, NULL, NULL, &pDacl, NULL, &pSD); - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); ok(pDacl != NULL, "DACL should not be NULL\n"); LocalFree(pSD); error = pGetNamedSecurityInfoA(windows_dir, SE_FILE_OBJECT,OWNER_SECURITY_INFORMATION, NULL, NULL, &pDacl, NULL, NULL); - ok(error==ERROR_INVALID_PARAMETER, "GetNamedSecurityInfo failed with error %d\n", error); + ok(error==ERROR_INVALID_PARAMETER, "GetNamedSecurityInfo failed with error %ld\n", error); /* Test behavior of SetNamedSecurityInfo with an invalid path */ SetLastError(0xdeadbeef); error = pSetNamedSecurityInfoA(invalid_path, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL); - ok(error == ERROR_FILE_NOT_FOUND, "Unexpected error returned: 0x%x\n", error); + ok(error == ERROR_FILE_NOT_FOUND, "Unexpected error returned: 0x%lx\n", error); ok(GetLastError() == 0xdeadbeef, "Expected last error to remain unchanged.\n"); /* Create security descriptor information and test that it comes back the same */ @@ -3955,7 +3955,7 @@ static void test_GetNamedSecurityInfoA(void) CloseHandle(hTemp); return; } - ok(!error, "SetNamedSecurityInfoA failed with error %d\n", error); + ok(!error, "SetNamedSecurityInfoA failed with error %ld\n", error); SetLastError(0xdeadbeef); error = pGetNamedSecurityInfoA(tmpfile, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, &pDacl, NULL, &pSD); @@ -3966,7 +3966,7 @@ static void test_GetNamedSecurityInfoA(void) CloseHandle(hTemp); return; } - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); ok(bret, "GetAclInformation failed\n"); @@ -3979,7 +3979,7 @@ static void test_GetNamedSecurityInfoA(void) debugstr_sid(&ace->SidStart), debugstr_sid(user_sid)); ok(((ACE_HEADER *)ace)->AceFlags == 0, "Current User ACE has unexpected flags (0x%x != 0x0)\n", ((ACE_HEADER *)ace)->AceFlags); - ok(ace->Mask == 0x1f01ff, "Current User ACE has unexpected mask (0x%x != 0x1f01ff)\n", + ok(ace->Mask == 0x1f01ff, "Current User ACE has unexpected mask (0x%lx != 0x1f01ff)\n", ace->Mask); } if (acl_size.AceCount > 1) @@ -3993,7 +3993,7 @@ static void test_GetNamedSecurityInfoA(void) ok(((ACE_HEADER *)ace)->AceFlags == 0, "Administators Group ACE has unexpected flags (0x%x != 0x0)\n", ((ACE_HEADER *)ace)->AceFlags); ok(ace->Mask == 0x1f01ff || broken(ace->Mask == GENERIC_ALL) /* win2k */, - "Administators Group ACE has unexpected mask (0x%x != 0x1f01ff)\n", ace->Mask); + "Administators Group ACE has unexpected mask (0x%lx != 0x1f01ff)\n", ace->Mask); } LocalFree(pSD); @@ -4003,12 +4003,12 @@ static void test_GetNamedSecurityInfoA(void) ok(bret, "Failed to initialize ACL.\n"); error = pSetNamedSecurityInfoA(tmpfile, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, pDacl, NULL); - ok(!error, "SetNamedSecurityInfoA failed with error %d\n", error); + ok(!error, "SetNamedSecurityInfoA failed with error %ld\n", error); HeapFree(GetProcessHeap(), 0, pDacl); error = pGetNamedSecurityInfoA(tmpfile, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, &pDacl, NULL, &pSD); - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); ok(bret, "GetAclInformation failed\n"); @@ -4023,23 +4023,23 @@ static void test_GetNamedSecurityInfoA(void) h = CreateFileA(tmpfile, GENERIC_READ, FILE_SHARE_DELETE|FILE_SHARE_WRITE|FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); - ok(h != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(h != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); CloseHandle(h); /* test setting NULL DACL */ error = pSetNamedSecurityInfoA(tmpfile, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL); - ok(!error, "SetNamedSecurityInfoA failed with error %d\n", error); + ok(!error, "SetNamedSecurityInfoA failed with error %ld\n", error); error = pGetNamedSecurityInfoA(tmpfile, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, &pDacl, NULL, &pSD); - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); todo_wine ok(!pDacl, "pDacl != NULL\n"); LocalFree(pSD); h = CreateFileA(tmpfile, GENERIC_READ, FILE_SHARE_DELETE|FILE_SHARE_WRITE|FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); - ok(h != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(h != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); CloseHandle(h); /* NtSetSecurityObject doesn't inherit DACL entries */ @@ -4051,30 +4051,30 @@ static void test_GetNamedSecurityInfoA(void) bret = SetSecurityDescriptorDacl(pSD, TRUE, pDacl, FALSE); ok(bret, "Failed to add ACL to security descriptor.\n"); status = pNtSetSecurityObject(hTemp, DACL_SECURITY_INFORMATION, pSD); - ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %x\n", status); + ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %lx\n", status); h = CreateFileA(tmpfile, GENERIC_READ, FILE_SHARE_DELETE|FILE_SHARE_WRITE|FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); - ok(h == INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(h == INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); CloseHandle(h); pSetSecurityDescriptorControl(pSD, SE_DACL_AUTO_INHERIT_REQ, SE_DACL_AUTO_INHERIT_REQ); status = pNtSetSecurityObject(hTemp, DACL_SECURITY_INFORMATION, pSD); - ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %x\n", status); + ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %lx\n", status); h = CreateFileA(tmpfile, GENERIC_READ, FILE_SHARE_DELETE|FILE_SHARE_WRITE|FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); - ok(h == INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(h == INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); CloseHandle(h); pSetSecurityDescriptorControl(pSD, SE_DACL_AUTO_INHERIT_REQ|SE_DACL_AUTO_INHERITED, SE_DACL_AUTO_INHERIT_REQ|SE_DACL_AUTO_INHERITED); status = pNtSetSecurityObject(hTemp, DACL_SECURITY_INFORMATION, pSD); - ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %x\n", status); + ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %lx\n", status); h = CreateFileA(tmpfile, GENERIC_READ, FILE_SHARE_DELETE|FILE_SHARE_WRITE|FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); - ok(h == INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(h == INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); CloseHandle(h); /* test if DACL is properly mapped to permission */ @@ -4087,11 +4087,11 @@ static void test_GetNamedSecurityInfoA(void) bret = SetSecurityDescriptorDacl(pSD, TRUE, pDacl, FALSE); ok(bret, "Failed to add ACL to security descriptor.\n"); status = pNtSetSecurityObject(hTemp, DACL_SECURITY_INFORMATION, pSD); - ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %x\n", status); + ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %lx\n", status); h = CreateFileA(tmpfile, GENERIC_READ, FILE_SHARE_DELETE|FILE_SHARE_WRITE|FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); - ok(h != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(h != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); CloseHandle(h); bret = InitializeAcl(pDacl, 100, ACL_REVISION); @@ -4103,11 +4103,11 @@ static void test_GetNamedSecurityInfoA(void) bret = SetSecurityDescriptorDacl(pSD, TRUE, pDacl, FALSE); ok(bret, "Failed to add ACL to security descriptor.\n"); status = pNtSetSecurityObject(hTemp, DACL_SECURITY_INFORMATION, pSD); - ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %x\n", status); + ok(status == ERROR_SUCCESS, "NtSetSecurityObject returned %lx\n", status); h = CreateFileA(tmpfile, GENERIC_READ, FILE_SHARE_DELETE|FILE_SHARE_WRITE|FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); - ok(h == INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(h == INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); HeapFree(GetProcessHeap(), 0, pDacl); HeapFree(GetProcessHeap(), 0, user); CloseHandle(hTemp); @@ -4118,20 +4118,20 @@ static void test_GetNamedSecurityInfoA(void) error = pGetNamedSecurityInfoA(software_key, SE_REGISTRY_KEY, OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, &pSD); - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); bret = AllocateAndInitializeSid(&SIDAuthNT, 1, SECURITY_LOCAL_SYSTEM_RID, 0, 0, 0, 0, 0, 0, 0, &localsys_sid); - ok(bret, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(bret, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); bret = GetSecurityDescriptorOwner(pSD, &owner, &owner_defaulted); - ok(bret, "GetSecurityDescriptorOwner failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorOwner failed with error %ld\n", GetLastError()); ok(owner != NULL, "owner should not be NULL\n"); ok(EqualSid(owner, admin_sid) || EqualSid(owner, localsys_sid), "MACHINE\\Software owner SID (%s) != Administrators SID (%s) or Local System Sid (%s).\n", debugstr_sid(owner), debugstr_sid(admin_sid), debugstr_sid(localsys_sid)); bret = GetSecurityDescriptorGroup(pSD, &group, &group_defaulted); - ok(bret, "GetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); ok(group != NULL, "group should not be NULL\n"); ok(EqualSid(group, admin_sid) || broken(EqualSid(group, system_sid)) /* before Win7 */ || broken(((SID*)group)->SubAuthority[0] == SECURITY_NT_NON_UNIQUE) /* Vista */, @@ -4144,10 +4144,10 @@ static void test_GetNamedSecurityInfoA(void) CreateWellKnownSid(WinBuiltinUsersSid, NULL, users_sid, &sid_size); error = pGetNamedSecurityInfoA(software_key, SE_REGISTRY_KEY, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, &pSD); - ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); + ok(!error, "GetNamedSecurityInfo failed with error %ld\n", error); bret = GetSecurityDescriptorDacl(pSD, &dacl_present, &pDacl, &dacl_defaulted); - ok(bret, "GetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); ok(dacl_present, "DACL should be present\n"); ok(pDacl && IsValidAcl(pDacl), "GetSecurityDescriptorDacl returned invalid DACL.\n"); bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); @@ -4177,7 +4177,7 @@ static void test_GetNamedSecurityInfoA(void) INHERIT_ONLY_ACE|CONTAINER_INHERIT_ACE); ok(ace->Mask == GENERIC_READ || broken(ace->Mask == KEY_READ), /* win 10 */ - "Builtin Users ACE has unexpected mask (0x%x != 0x%x)\n", + "Builtin Users ACE has unexpected mask (0x%lx != 0x%x)\n", ace->Mask, GENERIC_READ); } ok(admins_ace_id != -1, "Builtin Admins ACE not found.\n"); @@ -4194,7 +4194,7 @@ static void test_GetNamedSecurityInfoA(void) || broken(flags == CONTAINER_INHERIT_ACE), /* win 10 */ "Builtin Admins ACE has unexpected flags (0x%x != 0x0)\n", flags); ok(ace->Mask == KEY_ALL_ACCESS || broken(ace->Mask == GENERIC_ALL) /* w2k8 */, - "Builtin Admins ACE has unexpected mask (0x%x != 0x%x)\n", ace->Mask, KEY_ALL_ACCESS); + "Builtin Admins ACE has unexpected mask (0x%lx != 0x%x)\n", ace->Mask, KEY_ALL_ACCESS); } FreeSid(localsys_sid); @@ -4266,11 +4266,11 @@ static void test_ConvertStringSecurityDescriptor(void) ret = ConvertStringSecurityDescriptorToSecurityDescriptorA( cssd[i].sidstring, cssd[i].revision, &pSD, NULL); GLE = GetLastError(); - ok(ret == cssd[i].ret, "(%02u) Expected %s (%d)\n", i, cssd[i].ret ? "success" : "failure", GLE); + ok(ret == cssd[i].ret, "(%02u) Expected %s (%ld)\n", i, cssd[i].ret ? "success" : "failure", GLE); if (!cssd[i].ret) ok(GLE == cssd[i].GLE || (cssd[i].altGLE && GLE == cssd[i].altGLE), - "(%02u) Unexpected last error %d\n", i, GLE); + "(%02u) Unexpected last error %ld\n", i, GLE); if (ret) LocalFree(pSD); } @@ -4281,50 +4281,50 @@ static void test_ConvertStringSecurityDescriptor(void) NULL, 0xdeadbeef, &pSD, NULL); todo_wine ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pConvertStringSecurityDescriptorToSecurityDescriptorW( NULL, 0xdeadbeef, &pSD, NULL); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ConvertStringSecurityDescriptorToSecurityDescriptorA( "D:(A;;ROB;;;WD)", 0xdeadbeef, NULL, NULL); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = ConvertStringSecurityDescriptorToSecurityDescriptorA( "D:(A;;ROB;;;WD)", SDDL_REVISION_1, NULL, NULL); ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, - "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %d\n", + "ConvertStringSecurityDescriptorToSecurityDescriptor should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); /* test behaviour with empty strings */ SetLastError(0xdeadbeef); ret = pConvertStringSecurityDescriptorToSecurityDescriptorW( Blank, SDDL_REVISION_1, &pSD, NULL); - ok(ret, "ConvertStringSecurityDescriptorToSecurityDescriptor failed with error %d\n", GetLastError()); + ok(ret, "ConvertStringSecurityDescriptorToSecurityDescriptor failed with error %ld\n", GetLastError()); LocalFree(pSD); SetLastError(0xdeadbeef); ret = ConvertStringSecurityDescriptorToSecurityDescriptorA( "D:P(A;;GRGW;;;BA)(A;;GRGW;;;S-1-5-21-0-0-0-1000)S:(ML;;NWNR;;;S-1-16-12288)", SDDL_REVISION_1, &pSD, NULL); ok(ret || broken(!ret && GetLastError() == ERROR_INVALID_DATATYPE) /* win2k */, - "ConvertStringSecurityDescriptorToSecurityDescriptor failed with error %u\n", GetLastError()); + "ConvertStringSecurityDescriptorToSecurityDescriptor failed with error %lu\n", GetLastError()); if (ret) LocalFree(pSD); /* empty DACL */ size = 0; SetLastError(0xdeadbeef); ret = ConvertStringSecurityDescriptorToSecurityDescriptorA("D:", SDDL_REVISION_1, &pSD, &size); - ok(ret, "unexpected error %u\n", GetLastError()); - ok(size == sizeof(SECURITY_DESCRIPTOR_RELATIVE) + sizeof(ACL), "got %u\n", size); + ok(ret, "unexpected error %lu\n", GetLastError()); + ok(size == sizeof(SECURITY_DESCRIPTOR_RELATIVE) + sizeof(ACL), "got %lu\n", size); acl = (ACL *)((char *)pSD + sizeof(SECURITY_DESCRIPTOR_RELATIVE)); ok(acl->AclRevision == ACL_REVISION, "got %u\n", acl->AclRevision); ok(!acl->Sbz1, "got %u\n", acl->Sbz1); @@ -4337,8 +4337,8 @@ static void test_ConvertStringSecurityDescriptor(void) size = 0; SetLastError(0xdeadbeef); ret = ConvertStringSecurityDescriptorToSecurityDescriptorA("S:", SDDL_REVISION_1, &pSD, &size); - ok(ret, "unexpected error %u\n", GetLastError()); - ok(size == sizeof(SECURITY_DESCRIPTOR_RELATIVE) + sizeof(ACL), "got %u\n", size); + ok(ret, "unexpected error %lu\n", GetLastError()); + ok(size == sizeof(SECURITY_DESCRIPTOR_RELATIVE) + sizeof(ACL), "got %lu\n", size); acl = (ACL *)((char *)pSD + sizeof(SECURITY_DESCRIPTOR_RELATIVE)); ok(!acl->Sbz1, "got %u\n", acl->Sbz1); ok(acl->AclSize == sizeof(*acl), "got %u\n", acl->AclSize); @@ -4369,12 +4369,12 @@ static void test_ConvertSecurityDescriptorToString(void) * don't replicate this feature so we only test len >= strlen+1. */ #define CHECK_RESULT_AND_FREE(exp_str) \ ok(strcmp(string, (exp_str)) == 0, "String mismatch (expected \"%s\", got \"%s\")\n", (exp_str), string); \ - ok(len >= (strlen(exp_str) + 1), "Length mismatch (expected %d, got %d)\n", lstrlenA(exp_str) + 1, len); \ + ok(len >= (strlen(exp_str) + 1), "Length mismatch (expected %d, got %ld)\n", lstrlenA(exp_str) + 1, len); \ LocalFree(string); #define CHECK_ONE_OF_AND_FREE(exp_str1, exp_str2) \ ok(strcmp(string, (exp_str1)) == 0 || strcmp(string, (exp_str2)) == 0, "String mismatch (expected\n\"%s\" or\n\"%s\", got\n\"%s\")\n", (exp_str1), (exp_str2), string); \ - ok(len >= (strlen(exp_str1) + 1) || len >= (strlen(exp_str2) + 1), "Length mismatch (expected %d or %d, got %d)\n", lstrlenA(exp_str1) + 1, lstrlenA(exp_str2) + 1, len); \ + ok(len >= (strlen(exp_str1) + 1) || len >= (strlen(exp_str2) + 1), "Length mismatch (expected %d or %d, got %ld)\n", lstrlenA(exp_str1) + 1, lstrlenA(exp_str2) + 1, len); \ LocalFree(string); InitializeSecurityDescriptor(&desc, SECURITY_DESCRIPTOR_REVISION); @@ -4589,26 +4589,26 @@ static void test_PrivateObjectSecurity(void) expect_eq(ctrl, 0x9014, int, "%x"); ret = GetPrivateObjectSecurity(sec, GROUP_SECURITY_INFORMATION, buf, dwDescSize, &retSize); - ok(ret, "GetPrivateObjectSecurity failed (err=%u)\n", GetLastError()); - ok(retSize <= dwDescSize, "Buffer too small (%d vs %d)\n", retSize, dwDescSize); + ok(ret, "GetPrivateObjectSecurity failed (err=%lu)\n", GetLastError()); + ok(retSize <= dwDescSize, "Buffer too small (%ld vs %ld)\n", retSize, dwDescSize); ok(pConvertSecurityDescriptorToStringSecurityDescriptorA(buf, SDDL_REVISION_1, sec_info, &string, &len), "Conversion failed\n"); CHECK_RESULT_AND_FREE("G:S-1-5-21-93476-23408-4576"); GetSecurityDescriptorControl(buf, &ctrl, &dwRevision); expect_eq(ctrl, 0x8000, int, "%x"); ret = GetPrivateObjectSecurity(sec, GROUP_SECURITY_INFORMATION|DACL_SECURITY_INFORMATION, buf, dwDescSize, &retSize); - ok(ret, "GetPrivateObjectSecurity failed (err=%u)\n", GetLastError()); - ok(retSize <= dwDescSize, "Buffer too small (%d vs %d)\n", retSize, dwDescSize); + ok(ret, "GetPrivateObjectSecurity failed (err=%lu)\n", GetLastError()); + ok(retSize <= dwDescSize, "Buffer too small (%ld vs %ld)\n", retSize, dwDescSize); ret = pConvertSecurityDescriptorToStringSecurityDescriptorA(buf, SDDL_REVISION_1, sec_info, &string, &len); - ok(ret, "Conversion failed err=%u\n", GetLastError()); + ok(ret, "Conversion failed err=%lu\n", GetLastError()); CHECK_ONE_OF_AND_FREE("G:S-1-5-21-93476-23408-4576D:(A;NP;GAGXGWGR;;;SU)(A;IOID;CCDC;;;SU)(D;OICI;0xffffffff;;;S-1-5-21-93476-23408-4576)", "G:S-1-5-21-93476-23408-4576D:P(A;NP;GAGXGWGR;;;SU)(A;IOID;CCDC;;;SU)(D;OICI;0xffffffff;;;S-1-5-21-93476-23408-4576)"); /* Win7 */ GetSecurityDescriptorControl(buf, &ctrl, &dwRevision); expect_eq(ctrl & (~ SE_DACL_PROTECTED), 0x8004, int, "%x"); ret = GetPrivateObjectSecurity(sec, sec_info, buf, dwDescSize, &retSize); - ok(ret, "GetPrivateObjectSecurity failed (err=%u)\n", GetLastError()); - ok(retSize == dwDescSize, "Buffer too small (%d vs %d)\n", retSize, dwDescSize); + ok(ret, "GetPrivateObjectSecurity failed (err=%lu)\n", GetLastError()); + ok(retSize == dwDescSize, "Buffer too small (%ld vs %ld)\n", retSize, dwDescSize); ok(pConvertSecurityDescriptorToStringSecurityDescriptorA(buf, SDDL_REVISION_1, sec_info, &string, &len), "Conversion failed\n"); CHECK_ONE_OF_AND_FREE("O:SY" "G:S-1-5-21-93476-23408-4576" @@ -4623,7 +4623,7 @@ static void test_PrivateObjectSecurity(void) SetLastError(0xdeadbeef); ok(GetPrivateObjectSecurity(sec, sec_info, buf, 5, &retSize) == FALSE, "GetPrivateObjectSecurity should have failed\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected error ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected error ERROR_INSUFFICIENT_BUFFER, got %lu\n", GetLastError()); LocalFree(sec); HeapFree(GetProcessHeap(), 0, buf); @@ -4645,43 +4645,43 @@ static void test_InitializeAcl(void) return; } - ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "InitializeAcl with too small a buffer should have failed with ERROR_INSUFFICIENT_BUFFER instead of %d\n", GetLastError()); + ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "InitializeAcl with too small a buffer should have failed with ERROR_INSUFFICIENT_BUFFER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = InitializeAcl(pAcl, 0xffffffff, ACL_REVISION); - ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "InitializeAcl with too large a buffer should have failed with ERROR_INVALID_PARAMETER instead of %d\n", GetLastError()); + ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "InitializeAcl with too large a buffer should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = InitializeAcl(pAcl, sizeof(buffer), ACL_REVISION1); - ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "InitializeAcl(ACL_REVISION1) should have failed with ERROR_INVALID_PARAMETER instead of %d\n", GetLastError()); + ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "InitializeAcl(ACL_REVISION1) should have failed with ERROR_INVALID_PARAMETER instead of %ld\n", GetLastError()); ret = InitializeAcl(pAcl, sizeof(buffer), ACL_REVISION2); - ok(ret, "InitializeAcl(ACL_REVISION2) failed with error %d\n", GetLastError()); + ok(ret, "InitializeAcl(ACL_REVISION2) failed with error %ld\n", GetLastError()); ret = IsValidAcl(pAcl); - ok(ret, "IsValidAcl failed with error %d\n", GetLastError()); + ok(ret, "IsValidAcl failed with error %ld\n", GetLastError()); ret = InitializeAcl(pAcl, sizeof(buffer), ACL_REVISION3); - ok(ret, "InitializeAcl(ACL_REVISION3) failed with error %d\n", GetLastError()); + ok(ret, "InitializeAcl(ACL_REVISION3) failed with error %ld\n", GetLastError()); ret = IsValidAcl(pAcl); - ok(ret, "IsValidAcl failed with error %d\n", GetLastError()); + ok(ret, "IsValidAcl failed with error %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = InitializeAcl(pAcl, sizeof(buffer), ACL_REVISION4); if (GetLastError() != ERROR_INVALID_PARAMETER) { - ok(ret, "InitializeAcl(ACL_REVISION4) failed with error %d\n", GetLastError()); + ok(ret, "InitializeAcl(ACL_REVISION4) failed with error %ld\n", GetLastError()); ret = IsValidAcl(pAcl); - ok(ret, "IsValidAcl failed with error %d\n", GetLastError()); + ok(ret, "IsValidAcl failed with error %ld\n", GetLastError()); } else win_skip("ACL_REVISION4 is not implemented on NT4\n"); SetLastError(0xdeadbeef); ret = InitializeAcl(pAcl, sizeof(buffer), -1); - ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "InitializeAcl(-1) failed with error %d\n", GetLastError()); + ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "InitializeAcl(-1) failed with error %ld\n", GetLastError()); } static void test_GetSecurityInfo(void) @@ -4724,7 +4724,7 @@ static void test_GetSecurityInfo(void) return; } bret = GetTokenInformation(token, TokenUser, b, l, &l); - ok(bret, "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + ok(bret, "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); CloseHandle( token ); user_sid = ((TOKEN_USER *)b)->User.Sid; @@ -4746,7 +4746,7 @@ static void test_GetSecurityInfo(void) CloseHandle(obj); return; } - ok(ret == ERROR_SUCCESS, "GetSecurityInfo returned %d\n", ret); + ok(ret == ERROR_SUCCESS, "GetSecurityInfo returned %ld\n", ret); ok(pSD != NULL, "GetSecurityInfo\n"); ok(owner != NULL, "GetSecurityInfo\n"); ok(group != NULL, "GetSecurityInfo\n"); @@ -4762,7 +4762,7 @@ static void test_GetSecurityInfo(void) ret = GetSecurityInfo(obj, SE_FILE_OBJECT, OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, &owner, &group, &pDacl, NULL, NULL); - ok(ret == ERROR_SUCCESS, "GetSecurityInfo returned %d\n", ret); + ok(ret == ERROR_SUCCESS, "GetSecurityInfo returned %ld\n", ret); ok(owner != NULL, "GetSecurityInfo\n"); ok(group != NULL, "GetSecurityInfo\n"); if (pDacl != NULL) @@ -4785,10 +4785,10 @@ static void test_GetSecurityInfo(void) ok(bret, "Failed to add ACL to security descriptor.\n"); ret = pSetSecurityInfo(obj, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, pDacl, NULL); - ok(ret == ERROR_SUCCESS, "SetSecurityInfo returned %d\n", ret); + ok(ret == ERROR_SUCCESS, "SetSecurityInfo returned %ld\n", ret); ret = GetSecurityInfo(obj, SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, &pDacl, NULL, &pSD); - ok(ret == ERROR_SUCCESS, "GetSecurityInfo returned %d\n", ret); + ok(ret == ERROR_SUCCESS, "GetSecurityInfo returned %ld\n", ret); ok(pDacl && IsValidAcl(pDacl), "GetSecurityInfo returned invalid DACL.\n"); bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); ok(bret, "GetAclInformation failed\n"); @@ -4801,7 +4801,7 @@ static void test_GetSecurityInfo(void) debugstr_sid(&ace->SidStart), debugstr_sid(user_sid)); ok(((ACE_HEADER *)ace)->AceFlags == 0, "Current User ACE has unexpected flags (0x%x != 0x0)\n", ((ACE_HEADER *)ace)->AceFlags); - ok(ace->Mask == 0x1f01ff, "Current User ACE has unexpected mask (0x%x != 0x1f01ff)\n", + ok(ace->Mask == 0x1f01ff, "Current User ACE has unexpected mask (0x%lx != 0x1f01ff)\n", ace->Mask); } if (acl_size.AceCount > 1) @@ -4812,7 +4812,7 @@ static void test_GetSecurityInfo(void) todo_wine ok(bret, "Administators Group ACE (%s) != Administators Group SID (%s).\n", debugstr_sid(&ace->SidStart), debugstr_sid(admin_sid)); ok(((ACE_HEADER *)ace)->AceFlags == 0, "Administators Group ACE has unexpected flags (0x%x != 0x0)\n", ((ACE_HEADER *)ace)->AceFlags); - ok(ace->Mask == 0x1f01ff, "Administators Group ACE has unexpected mask (0x%x != 0x1f01ff)\n", + ok(ace->Mask == 0x1f01ff, "Administators Group ACE has unexpected mask (0x%lx != 0x1f01ff)\n", ace->Mask); } LocalFree(pSD); @@ -4835,16 +4835,16 @@ static void test_GetSecurityInfo(void) ret = GetSecurityInfo(GetCurrentProcess(), SE_KERNEL_OBJECT, OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, &pSD); - ok(!ret, "GetNamedSecurityInfo failed with error %d\n", ret); + ok(!ret, "GetNamedSecurityInfo failed with error %ld\n", ret); bret = GetSecurityDescriptorOwner(pSD, &owner, &owner_defaulted); - ok(bret, "GetSecurityDescriptorOwner failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorOwner failed with error %ld\n", GetLastError()); ok(owner != NULL, "owner should not be NULL\n"); ok(EqualSid(owner, admin_sid) || EqualSid(owner, user_sid), "Process owner SID != Administrators SID.\n"); bret = GetSecurityDescriptorGroup(pSD, &group, &group_defaulted); - ok(bret, "GetSecurityDescriptorGroup failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorGroup failed with error %ld\n", GetLastError()); ok(group != NULL, "group should not be NULL\n"); ok(EqualSid(group, domain_users_sid), "Process group SID != Domain Users SID.\n"); LocalFree(pSD); @@ -4852,10 +4852,10 @@ static void test_GetSecurityInfo(void) /* Test querying the DACL of a process */ ret = GetSecurityInfo(GetCurrentProcess(), SE_KERNEL_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, &pSD); - ok(!ret, "GetSecurityInfo failed with error %d\n", ret); + ok(!ret, "GetSecurityInfo failed with error %ld\n", ret); bret = GetSecurityDescriptorDacl(pSD, &dacl_present, &pDacl, &dacl_defaulted); - ok(bret, "GetSecurityDescriptorDacl failed with error %d\n", GetLastError()); + ok(bret, "GetSecurityDescriptorDacl failed with error %ld\n", GetLastError()); ok(dacl_present, "DACL should be present\n"); ok(pDacl && IsValidAcl(pDacl), "GetSecurityDescriptorDacl returned invalid DACL.\n"); bret = GetAclInformation(pDacl, &acl_size, sizeof(acl_size), AclSizeInformation); @@ -4880,7 +4880,7 @@ static void test_GetSecurityInfo(void) ok(flags == (INHERIT_ONLY_ACE|CONTAINER_INHERIT_ACE), "Domain Users ACE has unexpected flags (0x%x != 0x%x)\n", flags, INHERIT_ONLY_ACE|CONTAINER_INHERIT_ACE); - ok(ace->Mask == GENERIC_READ, "Domain Users ACE has unexpected mask (0x%x != 0x%x)\n", + ok(ace->Mask == GENERIC_READ, "Domain Users ACE has unexpected mask (0x%lx != 0x%x)\n", ace->Mask, GENERIC_READ); } ok(admins_ace_id != -1 || broken(admins_ace_id == -1) /* xp */, @@ -4892,7 +4892,7 @@ static void test_GetSecurityInfo(void) flags = ((ACE_HEADER *)ace)->AceFlags; ok(flags == 0x0, "Builtin Admins ACE has unexpected flags (0x%x != 0x0)\n", flags); ok(ace->Mask == PROCESS_ALL_ACCESS || broken(ace->Mask == 0x1f0fff) /* win2k */, - "Builtin Admins ACE has unexpected mask (0x%x != 0x%x)\n", ace->Mask, PROCESS_ALL_ACCESS); + "Builtin Admins ACE has unexpected mask (0x%lx != 0x%x)\n", ace->Mask, PROCESS_ALL_ACCESS); } LocalFree(pSD); } @@ -4907,16 +4907,16 @@ static void test_GetSidSubAuthority(void) ok(IsValidSid(psid),"Sid is not valid\n"); SetLastError(0xbebecaca); ok(*GetSidSubAuthorityCount(psid) == 4,"GetSidSubAuthorityCount gave %d expected 4\n", *GetSidSubAuthorityCount(psid)); - ok(GetLastError() == 0,"GetLastError returned %d instead of 0\n",GetLastError()); + ok(GetLastError() == 0,"GetLastError returned %ld instead of 0\n",GetLastError()); SetLastError(0xbebecaca); - ok(*GetSidSubAuthority(psid,0) == 21,"GetSidSubAuthority gave %d expected 21\n", *GetSidSubAuthority(psid,0)); - ok(GetLastError() == 0,"GetLastError returned %d instead of 0\n",GetLastError()); + ok(*GetSidSubAuthority(psid,0) == 21,"GetSidSubAuthority gave %ld expected 21\n", *GetSidSubAuthority(psid,0)); + ok(GetLastError() == 0,"GetLastError returned %ld instead of 0\n",GetLastError()); SetLastError(0xbebecaca); - ok(*GetSidSubAuthority(psid,1) == 93476,"GetSidSubAuthority gave %d expected 93476\n", *GetSidSubAuthority(psid,1)); - ok(GetLastError() == 0,"GetLastError returned %d instead of 0\n",GetLastError()); + ok(*GetSidSubAuthority(psid,1) == 93476,"GetSidSubAuthority gave %ld expected 93476\n", *GetSidSubAuthority(psid,1)); + ok(GetLastError() == 0,"GetLastError returned %ld instead of 0\n",GetLastError()); SetLastError(0xbebecaca); ok(GetSidSubAuthority(psid,4) != NULL,"Expected out of bounds GetSidSubAuthority to return a non-NULL pointer\n"); - ok(GetLastError() == 0,"GetLastError returned %d instead of 0\n",GetLastError()); + ok(GetLastError() == 0,"GetLastError returned %ld instead of 0\n",GetLastError()); LocalFree(psid); } @@ -4935,19 +4935,19 @@ static void test_CheckTokenMembership(void) return; } ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE|TOKEN_QUERY, &process_token); - ok(ret, "OpenProcessToken failed with error %d\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %ld\n", GetLastError()); ret = DuplicateToken(process_token, SecurityImpersonation, &token); - ok(ret, "DuplicateToken failed with error %d\n", GetLastError()); + ok(ret, "DuplicateToken failed with error %ld\n", GetLastError()); /* groups */ ret = GetTokenInformation(token, TokenGroups, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "GetTokenInformation(TokenGroups) %s with error %d\n", + "GetTokenInformation(TokenGroups) %s with error %ld\n", ret ? "succeeded" : "failed", GetLastError()); token_groups = HeapAlloc(GetProcessHeap(), 0, size); ret = GetTokenInformation(token, TokenGroups, token_groups, size, &size); - ok(ret, "GetTokenInformation(TokenGroups) failed with error %d\n", GetLastError()); + ok(ret, "GetTokenInformation(TokenGroups) failed with error %ld\n", GetLastError()); for (i = 0; i < token_groups->GroupCount; i++) { @@ -4965,19 +4965,19 @@ static void test_CheckTokenMembership(void) is_member = FALSE; ret = pCheckTokenMembership(token, token_groups->Groups[i].Sid, &is_member); - ok(ret, "CheckTokenMembership failed with error %d\n", GetLastError()); + ok(ret, "CheckTokenMembership failed with error %ld\n", GetLastError()); ok(is_member, "CheckTokenMembership should have detected sid as member\n"); is_member = FALSE; ret = pCheckTokenMembership(NULL, token_groups->Groups[i].Sid, &is_member); - ok(ret, "CheckTokenMembership failed with error %d\n", GetLastError()); + ok(ret, "CheckTokenMembership failed with error %ld\n", GetLastError()); ok(is_member, "CheckTokenMembership should have detected sid as member\n"); is_member = TRUE; SetLastError(0xdeadbeef); ret = pCheckTokenMembership(process_token, token_groups->Groups[i].Sid, &is_member); ok(!ret && GetLastError() == ERROR_NO_IMPERSONATION_TOKEN, - "CheckTokenMembership with process token %s with error %d\n", + "CheckTokenMembership with process token %s with error %ld\n", ret ? "succeeded" : "failed", GetLastError()); ok(!is_member, "CheckTokenMembership should have cleared is_member\n"); @@ -5001,33 +5001,33 @@ static void test_EqualSid(void) win_skip("AllocateAndInitializeSid is not implemented\n"); return; } - ok(ret, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(ret, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); ok(GetLastError() == 0xdeadbeef, - "AllocateAndInitializeSid shouldn't have set last error to %d\n", + "AllocateAndInitializeSid shouldn't have set last error to %ld\n", GetLastError()); ret = AllocateAndInitializeSid(&SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &sid2); - ok(ret, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(ret, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = EqualSid(sid1, sid2); ok(!ret, "World and domain admins sids shouldn't have been equal\n"); ok(GetLastError() == ERROR_SUCCESS || broken(GetLastError() == 0xdeadbeef), /* NT4 */ - "EqualSid should have set last error to ERROR_SUCCESS instead of %d\n", + "EqualSid should have set last error to ERROR_SUCCESS instead of %ld\n", GetLastError()); SetLastError(0xdeadbeef); sid2 = FreeSid(sid2); ok(!sid2, "FreeSid should have returned NULL instead of %p\n", sid2); ok(GetLastError() == 0xdeadbeef, - "FreeSid shouldn't have set last error to %d\n", + "FreeSid shouldn't have set last error to %ld\n", GetLastError()); ret = AllocateAndInitializeSid(&SIDAuthNT, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &sid2); - ok(ret, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(ret, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = EqualSid(sid1, sid2); @@ -5035,7 +5035,7 @@ static void test_EqualSid(void) debugstr_sid(sid1), debugstr_sid(sid2)); ok(GetLastError() == ERROR_SUCCESS || broken(GetLastError() == 0xdeadbeef), /* NT4 */ - "EqualSid should have set last error to ERROR_SUCCESS instead of %d\n", + "EqualSid should have set last error to ERROR_SUCCESS instead of %ld\n", GetLastError()); ((SID *)sid2)->Revision = 2; @@ -5044,7 +5044,7 @@ static void test_EqualSid(void) ok(!ret, "EqualSid with invalid sid should have returned FALSE\n"); ok(GetLastError() == ERROR_SUCCESS || broken(GetLastError() == 0xdeadbeef), /* NT4 */ - "EqualSid should have set last error to ERROR_SUCCESS instead of %d\n", + "EqualSid should have set last error to ERROR_SUCCESS instead of %ld\n", GetLastError()); ((SID *)sid2)->Revision = SID_REVISION; @@ -5069,15 +5069,15 @@ static void test_GetUserNameA(void) required_len = 0; ret = GetUserNameA(NULL, &required_len); ok(ret == FALSE, "GetUserNameA returned %d\n", ret); - ok(required_len != 0, "Outputted buffer length was %u\n", required_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(required_len != 0, "Outputted buffer length was %lu\n", required_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); SetLastError(0xdeadbeef); required_len = 1; ret = GetUserNameA(NULL, &required_len); ok(ret == FALSE, "GetUserNameA returned %d\n", ret); - ok(required_len != 0 && required_len != 1, "Outputted buffer length was %u\n", required_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(required_len != 0 && required_len != 1, "Outputted buffer length was %lu\n", required_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); /* Tests crashes on Windows. */ if (0) @@ -5100,19 +5100,19 @@ static void test_GetUserNameA(void) ret = GetUserNameA(buffer, &required_len); ok(ret == FALSE, "GetUserNameA returned %d\n", ret); ok(!memcmp(buffer, filler, sizeof(filler)), "Output buffer was altered\n"); - ok(required_len != 0, "Outputted buffer length was %u\n", required_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(required_len != 0, "Outputted buffer length was %lu\n", required_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); SetLastError(0xdeadbeef); memcpy(buffer, filler, sizeof(filler)); buffer_len = required_len; ret = GetUserNameA(buffer, &buffer_len); - ok(ret == TRUE, "GetUserNameA returned %d, last error %u\n", ret, GetLastError()); + ok(ret == TRUE, "GetUserNameA returned %d, last error %lu\n", ret, GetLastError()); ok(memcmp(buffer, filler, sizeof(filler)) != 0, "Output buffer was untouched\n"); ok(buffer_len == required_len || broken(buffer_len == required_len / sizeof(WCHAR)), /* XP+ */ - "Outputted buffer length was %u\n", buffer_len); - ok(GetLastError() == 0xdeadbeef, "Last error was %u\n", GetLastError()); + "Outputted buffer length was %lu\n", buffer_len); + ok(GetLastError() == 0xdeadbeef, "Last error was %lu\n", GetLastError()); /* Use the reported buffer size from the last GetUserNameA call and pass * a length that is one less than the required value. */ @@ -5122,8 +5122,8 @@ static void test_GetUserNameA(void) ret = GetUserNameA(buffer, &buffer_len); ok(ret == FALSE, "GetUserNameA returned %d\n", ret); ok(!memcmp(buffer, filler, sizeof(filler)), "Output buffer was untouched\n"); - ok(buffer_len == required_len, "Outputted buffer length was %u\n", buffer_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(buffer_len == required_len, "Outputted buffer length was %lu\n", buffer_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); } static void test_GetUserNameW(void) @@ -5143,15 +5143,15 @@ static void test_GetUserNameW(void) required_len = 0; ret = GetUserNameW(NULL, &required_len); ok(ret == FALSE, "GetUserNameW returned %d\n", ret); - ok(required_len != 0, "Outputted buffer length was %u\n", required_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(required_len != 0, "Outputted buffer length was %lu\n", required_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); SetLastError(0xdeadbeef); required_len = 1; ret = GetUserNameW(NULL, &required_len); ok(ret == FALSE, "GetUserNameW returned %d\n", ret); - ok(required_len != 0 && required_len != 1, "Outputted buffer length was %u\n", required_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(required_len != 0 && required_len != 1, "Outputted buffer length was %lu\n", required_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); /* Tests crash on Windows. */ if (0) @@ -5172,17 +5172,17 @@ static void test_GetUserNameW(void) ret = GetUserNameW(buffer, &required_len); ok(ret == FALSE, "GetUserNameW returned %d\n", ret); ok(!memcmp(buffer, filler, sizeof(filler)), "Output buffer was altered\n"); - ok(required_len != 0, "Outputted buffer length was %u\n", required_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(required_len != 0, "Outputted buffer length was %lu\n", required_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); SetLastError(0xdeadbeef); memcpy(buffer, filler, sizeof(filler)); buffer_len = required_len; ret = GetUserNameW(buffer, &buffer_len); - ok(ret == TRUE, "GetUserNameW returned %d, last error %u\n", ret, GetLastError()); + ok(ret == TRUE, "GetUserNameW returned %d, last error %lu\n", ret, GetLastError()); ok(memcmp(buffer, filler, sizeof(filler)) != 0, "Output buffer was untouched\n"); - ok(buffer_len == required_len, "Outputted buffer length was %u\n", buffer_len); - ok(GetLastError() == 0xdeadbeef, "Last error was %u\n", GetLastError()); + ok(buffer_len == required_len, "Outputted buffer length was %lu\n", buffer_len); + ok(GetLastError() == 0xdeadbeef, "Last error was %lu\n", GetLastError()); /* GetUserNameW on XP and newer writes a truncated portion of the username string to the buffer. */ SetLastError(0xdeadbeef); @@ -5193,8 +5193,8 @@ static void test_GetUserNameW(void) ok(!memcmp(buffer, filler, sizeof(filler)) || broken(memcmp(buffer, filler, sizeof(filler)) != 0), /* XP+ */ "Output buffer was altered\n"); - ok(buffer_len == required_len, "Outputted buffer length was %u\n", buffer_len); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %u\n", GetLastError()); + ok(buffer_len == required_len, "Outputted buffer length was %lu\n", buffer_len); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Last error was %lu\n", GetLastError()); } static void test_CreateRestrictedToken(void) @@ -5216,18 +5216,18 @@ static void test_CreateRestrictedToken(void) DWORD i; ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE|TOKEN_QUERY, &process_token); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); ret = DuplicateTokenEx(process_token, TOKEN_DUPLICATE|TOKEN_ADJUST_GROUPS|TOKEN_QUERY, NULL, SecurityImpersonation, TokenImpersonation, &token); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); ret = GetTokenInformation(token, TokenGroups, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "got %d with error %d\n", ret, GetLastError()); + "got %d with error %ld\n", ret, GetLastError()); token_groups = HeapAlloc(GetProcessHeap(), 0, size); ret = GetTokenInformation(token, TokenGroups, token_groups, size, &size); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); for (i = 0; i < token_groups->GroupCount; i++) { @@ -5241,34 +5241,34 @@ static void test_CreateRestrictedToken(void) is_member = FALSE; ret = pCheckTokenMembership(token, removed_sid, &is_member); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); ok(is_member, "not a member\n"); sattr.Sid = removed_sid; sattr.Attributes = 0; r_token = NULL; ret = CreateRestrictedToken(token, 0, 1, &sattr, 0, NULL, 0, NULL, &r_token); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); is_member = TRUE; ret = pCheckTokenMembership(r_token, removed_sid, &is_member); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); ok(!is_member, "not a member\n"); ret = GetTokenInformation(r_token, TokenGroups, NULL, 0, &size); - ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %d with error %d\n", + ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %d with error %ld\n", ret, GetLastError()); groups2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetTokenInformation(r_token, TokenGroups, groups2, size, &size); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); for (i = 0; i < groups2->GroupCount; i++) { if (EqualSid(groups2->Groups[i].Sid, removed_sid)) { DWORD attr = groups2->Groups[i].Attributes; - ok(attr & SE_GROUP_USE_FOR_DENY_ONLY, "got wrong attributes %#x\n", attr); - ok(!(attr & SE_GROUP_ENABLED), "got wrong attributes %#x\n", attr); + ok(attr & SE_GROUP_USE_FOR_DENY_ONLY, "got wrong attributes %#lx\n", attr); + ok(!(attr & SE_GROUP_ENABLED), "got wrong attributes %#lx\n", attr); break; } } @@ -5277,29 +5277,29 @@ static void test_CreateRestrictedToken(void) size = sizeof(type); ret = GetTokenInformation(r_token, TokenType, &type, size, &size); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); ok(type == TokenImpersonation, "got type %u\n", type); size = sizeof(level); ret = GetTokenInformation(r_token, TokenImpersonationLevel, &level, size, &size); - ok(ret, "got error %d\n", GetLastError()); + ok(ret, "got error %ld\n", GetLastError()); ok(level == SecurityImpersonation, "got level %u\n", type); CloseHandle(r_token); r_token = NULL; ret = CreateRestrictedToken(process_token, 0, 1, &sattr, 0, NULL, 0, NULL, &r_token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); size = sizeof(type); ret = GetTokenInformation(r_token, TokenType, &type, size, &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(type == TokenPrimary, "got type %u\n", type); CloseHandle(r_token); ret = GetTokenInformation(token, TokenPrivileges, privs, sizeof(privs_buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); for (i = 0; i < privs->PrivilegeCount; i++) { @@ -5315,18 +5315,18 @@ static void test_CreateRestrictedToken(void) lattr.Attributes = 0; r_token = NULL; ret = CreateRestrictedToken(token, 0, 0, NULL, 1, &lattr, 0, NULL, &r_token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); priv_set.PrivilegeCount = 1; priv_set.Control = 0; priv_set.Privilege[0].Luid = luid; priv_set.Privilege[0].Attributes = 0; ret = PrivilegeCheck(r_token, &priv_set, &is_member); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(!is_member, "privilege should not be enabled\n"); ret = GetTokenInformation(r_token, TokenPrivileges, privs, sizeof(privs_buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); is_member = FALSE; for (i = 0; i < privs->PrivilegeCount; i++) @@ -5342,7 +5342,7 @@ static void test_CreateRestrictedToken(void) lattr.Luid.LowPart = 0xdeadbeef; r_token = NULL; ret = CreateRestrictedToken(token, 0, 1, &sattr, 1, &lattr, 0, NULL, &r_token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); CloseHandle(r_token); HeapFree(GetProcessHeap(), 0, token_groups); @@ -5364,7 +5364,7 @@ static void validate_default_security_descriptor(SECURITY_DESCRIPTOR *sd) acl = (void *)0xdeadbeef; SetLastError(0xdeadbeef); ret = GetSecurityDescriptorDacl(sd, &present, &acl, &defaulted); - ok(ret, "GetSecurityDescriptorDacl error %d\n", GetLastError()); + ok(ret, "GetSecurityDescriptorDacl error %ld\n", GetLastError()); todo_wine ok(present == 1, "acl is not present\n"); todo_wine @@ -5375,7 +5375,7 @@ static void validate_default_security_descriptor(SECURITY_DESCRIPTOR *sd) sid = (void *)0xdeadbeef; SetLastError(0xdeadbeef); ret = GetSecurityDescriptorOwner(sd, &sid, &defaulted); - ok(ret, "GetSecurityDescriptorOwner error %d\n", GetLastError()); + ok(ret, "GetSecurityDescriptorOwner error %ld\n", GetLastError()); todo_wine ok(sid != (void *)0xdeadbeef && sid != NULL, "sid pointer is not set\n"); ok(defaulted == 0, "defaulted is set to TRUE\n"); @@ -5384,7 +5384,7 @@ static void validate_default_security_descriptor(SECURITY_DESCRIPTOR *sd) sid = (void *)0xdeadbeef; SetLastError(0xdeadbeef); ret = GetSecurityDescriptorGroup(sd, &sid, &defaulted); - ok(ret, "GetSecurityDescriptorGroup error %d\n", GetLastError()); + ok(ret, "GetSecurityDescriptorGroup error %ld\n", GetLastError()); todo_wine ok(sid != (void *)0xdeadbeef && sid != NULL, "sid pointer is not set\n"); ok(defaulted == 0, "defaulted is set to TRUE\n"); @@ -5406,9 +5406,9 @@ static void test_default_handle_security(HANDLE token, HANDLE handle, GENERIC_MA SetLastError(0xdeadbeef); ret = AccessCheck(sd, token, MAXIMUM_ALLOWED, mapping, &priv_set, &priv_set_len, &granted, &status); todo_wine { - ok(ret, "AccessCheck error %d\n", GetLastError()); + ok(ret, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == mapping->GenericAll, "expected all access %#x, got %#x\n", mapping->GenericAll, granted); + ok(granted == mapping->GenericAll, "expected all access %#lx, got %#lx\n", mapping->GenericAll, granted); } priv_set_len = sizeof(priv_set); granted = 0xdeadbeef; @@ -5416,9 +5416,9 @@ todo_wine { SetLastError(0xdeadbeef); ret = AccessCheck(sd, token, 0, mapping, &priv_set, &priv_set_len, &granted, &status); todo_wine { - ok(ret, "AccessCheck error %d\n", GetLastError()); + ok(ret, "AccessCheck error %ld\n", GetLastError()); ok(status == 0 || broken(status == 1) /* NT4 */, "expected 0, got %d\n", status); - ok(granted == 0 || broken(granted == mapping->GenericRead) /* NT4 */, "expected 0, got %#x\n", granted); + ok(granted == 0 || broken(granted == mapping->GenericRead) /* NT4 */, "expected 0, got %#lx\n", granted); } priv_set_len = sizeof(priv_set); granted = 0xdeadbeef; @@ -5426,9 +5426,9 @@ todo_wine { SetLastError(0xdeadbeef); ret = AccessCheck(sd, token, ACCESS_SYSTEM_SECURITY, mapping, &priv_set, &priv_set_len, &granted, &status); todo_wine { - ok(ret, "AccessCheck error %d\n", GetLastError()); + ok(ret, "AccessCheck error %ld\n", GetLastError()); ok(status == 0, "expected 0, got %d\n", status); - ok(granted == 0, "expected 0, got %#x\n", granted); + ok(granted == 0, "expected 0, got %#lx\n", granted); } priv_set_len = sizeof(priv_set); granted = 0xdeadbeef; @@ -5436,9 +5436,9 @@ todo_wine { SetLastError(0xdeadbeef); ret = AccessCheck(sd, token, mapping->GenericRead, mapping, &priv_set, &priv_set_len, &granted, &status); todo_wine { - ok(ret, "AccessCheck error %d\n", GetLastError()); + ok(ret, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == mapping->GenericRead, "expected read access %#x, got %#x\n", mapping->GenericRead, granted); + ok(granted == mapping->GenericRead, "expected read access %#lx, got %#lx\n", mapping->GenericRead, granted); } priv_set_len = sizeof(priv_set); granted = 0xdeadbeef; @@ -5446,9 +5446,9 @@ todo_wine { SetLastError(0xdeadbeef); ret = AccessCheck(sd, token, mapping->GenericWrite, mapping, &priv_set, &priv_set_len, &granted, &status); todo_wine { - ok(ret, "AccessCheck error %d\n", GetLastError()); + ok(ret, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == mapping->GenericWrite, "expected write access %#x, got %#x\n", mapping->GenericWrite, granted); + ok(granted == mapping->GenericWrite, "expected write access %#lx, got %#lx\n", mapping->GenericWrite, granted); } priv_set_len = sizeof(priv_set); granted = 0xdeadbeef; @@ -5456,9 +5456,9 @@ todo_wine { SetLastError(0xdeadbeef); ret = AccessCheck(sd, token, mapping->GenericExecute, mapping, &priv_set, &priv_set_len, &granted, &status); todo_wine { - ok(ret, "AccessCheck error %d\n", GetLastError()); + ok(ret, "AccessCheck error %ld\n", GetLastError()); ok(status == 1, "expected 1, got %d\n", status); - ok(granted == mapping->GenericExecute, "expected execute access %#x, got %#x\n", mapping->GenericExecute, granted); + ok(granted == mapping->GenericExecute, "expected execute access %#lx, got %#lx\n", mapping->GenericExecute, granted); } HeapFree(GetProcessHeap(), 0, sd); } @@ -5471,7 +5471,7 @@ static ACCESS_MASK get_obj_access(HANDLE obj) if (!pNtQueryObject) return 0; status = pNtQueryObject(obj, ObjectBasicInformation, &info, sizeof(info), NULL); - ok(!status, "NtQueryObject error %#x\n", status); + ok(!status, "NtQueryObject error %#lx\n", status); return info.GrantedAccess; } @@ -5499,24 +5499,24 @@ static void test_mutex_security(HANDLE token) SetLastError(0xdeadbeef); mutex = OpenMutexA(0, FALSE, "WineTestMutex"); ok(!mutex, "mutex should not exist\n"); - ok(GetLastError() == ERROR_FILE_NOT_FOUND, "wrong error %u\n", GetLastError()); + ok(GetLastError() == ERROR_FILE_NOT_FOUND, "wrong error %lu\n", GetLastError()); SetLastError(0xdeadbeef); mutex = CreateMutexA(NULL, FALSE, "WineTestMutex"); - ok(mutex != 0, "CreateMutex error %d\n", GetLastError()); + ok(mutex != 0, "CreateMutex error %ld\n", GetLastError()); access = get_obj_access(mutex); - ok(access == MUTANT_ALL_ACCESS, "expected MUTANT_ALL_ACCESS, got %#x\n", access); + ok(access == MUTANT_ALL_ACCESS, "expected MUTANT_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), mutex, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); @@ -5525,7 +5525,7 @@ static void test_mutex_security(HANDLE token) todo_wine ok(!dup, "OpenMutex should fail\n"); todo_wine - ok(GetLastError() == ERROR_ACCESS_DENIED, "wrong error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "wrong error %lu\n", GetLastError()); } test_default_handle_security(token, mutex, &mapping); @@ -5556,24 +5556,24 @@ static void test_event_security(HANDLE token) SetLastError(0xdeadbeef); event = OpenEventA(0, FALSE, "WineTestEvent"); ok(!event, "event should not exist\n"); - ok(GetLastError() == ERROR_FILE_NOT_FOUND, "wrong error %u\n", GetLastError()); + ok(GetLastError() == ERROR_FILE_NOT_FOUND, "wrong error %lu\n", GetLastError()); SetLastError(0xdeadbeef); event = CreateEventA(NULL, FALSE, FALSE, "WineTestEvent"); - ok(event != 0, "CreateEvent error %d\n", GetLastError()); + ok(event != 0, "CreateEvent error %ld\n", GetLastError()); access = get_obj_access(event); - ok(access == EVENT_ALL_ACCESS, "expected EVENT_ALL_ACCESS, got %#x\n", access); + ok(access == EVENT_ALL_ACCESS, "expected EVENT_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), event, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); @@ -5582,7 +5582,7 @@ static void test_event_security(HANDLE token) todo_wine ok(!dup, "OpenEvent should fail\n"); todo_wine - ok(GetLastError() == ERROR_ACCESS_DENIED, "wrong error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "wrong error %lu\n", GetLastError()); } test_default_handle_security(token, event, &mapping); @@ -5613,24 +5613,24 @@ static void test_semaphore_security(HANDLE token) SetLastError(0xdeadbeef); sem = OpenSemaphoreA(0, FALSE, "WineTestSemaphore"); ok(!sem, "semaphore should not exist\n"); - ok(GetLastError() == ERROR_FILE_NOT_FOUND, "wrong error %u\n", GetLastError()); + ok(GetLastError() == ERROR_FILE_NOT_FOUND, "wrong error %lu\n", GetLastError()); SetLastError(0xdeadbeef); sem = CreateSemaphoreA(NULL, 0, 10, "WineTestSemaphore"); - ok(sem != 0, "CreateSemaphore error %d\n", GetLastError()); + ok(sem != 0, "CreateSemaphore error %ld\n", GetLastError()); access = get_obj_access(sem); - ok(access == SEMAPHORE_ALL_ACCESS, "expected SEMAPHORE_ALL_ACCESS, got %#x\n", access); + ok(access == SEMAPHORE_ALL_ACCESS, "expected SEMAPHORE_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), sem, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); } @@ -5681,11 +5681,11 @@ static void test_named_pipe_security(HANDLE token) pipe = CreateNamedPipeA(WINE_TEST_PIPE, creation_access[i].open_mode, PIPE_TYPE_BYTE | PIPE_NOWAIT, PIPE_UNLIMITED_INSTANCES, 0, 0, NMPWAIT_USE_DEFAULT_WAIT, NULL); - ok(pipe != INVALID_HANDLE_VALUE, "CreateNamedPipe(0x%x) error %d\n", + ok(pipe != INVALID_HANDLE_VALUE, "CreateNamedPipe(0x%lx) error %ld\n", creation_access[i].open_mode, GetLastError()); access = get_obj_access(pipe); ok(access == creation_access[i].access, - "CreateNamedPipeA(0x%x) pipe expected access 0x%x (got 0x%x)\n", + "CreateNamedPipeA(0x%lx) pipe expected access 0x%lx (got 0x%lx)\n", creation_access[i].open_mode, creation_access[i].access, access); CloseHandle(pipe); } @@ -5694,26 +5694,26 @@ static void test_named_pipe_security(HANDLE token) pipe = CreateNamedPipeA(WINE_TEST_PIPE, PIPE_ACCESS_DUPLEX | FILE_FLAG_FIRST_PIPE_INSTANCE, PIPE_TYPE_BYTE | PIPE_NOWAIT, PIPE_UNLIMITED_INSTANCES, 0, 0, NMPWAIT_USE_DEFAULT_WAIT, NULL); - ok(pipe != INVALID_HANDLE_VALUE, "CreateNamedPipe error %d\n", GetLastError()); + ok(pipe != INVALID_HANDLE_VALUE, "CreateNamedPipe error %ld\n", GetLastError()); test_default_handle_security(token, pipe, &mapping); SetLastError(0xdeadbeef); file = CreateFileA(WINE_TEST_PIPE, FILE_ALL_ACCESS, 0, NULL, OPEN_EXISTING, 0, 0); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); access = get_obj_access(file); - ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#x\n", access); + ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), file, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); } @@ -5723,22 +5723,22 @@ static void test_named_pipe_security(HANDLE token) SetLastError(0xdeadbeef); file = CreateFileA("\\\\.\\pipe\\", FILE_ALL_ACCESS, FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, OPEN_EXISTING, 0, 0); - ok(file != INVALID_HANDLE_VALUE || broken(file == INVALID_HANDLE_VALUE) /* before Vista */, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE || broken(file == INVALID_HANDLE_VALUE) /* before Vista */, "CreateFile error %ld\n", GetLastError()); if (file != INVALID_HANDLE_VALUE) { access = get_obj_access(file); - ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#x\n", access); + ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), file, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); } } @@ -5771,20 +5771,20 @@ static void test_file_security(HANDLE token) /* file */ SetLastError(0xdeadbeef); file = CreateFileA(file_name, GENERIC_ALL, 0, NULL, CREATE_ALWAYS, 0, NULL); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); access = get_obj_access(file); - ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#x\n", access); + ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), file, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); } @@ -5793,33 +5793,33 @@ static void test_file_security(HANDLE token) SetLastError(0xdeadbeef); file = CreateFileA(file_name, 0, 0, NULL, OPEN_EXISTING, 0, NULL); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); access = get_obj_access(file); - ok(access == (FILE_READ_ATTRIBUTES | SYNCHRONIZE), "expected FILE_READ_ATTRIBUTES | SYNCHRONIZE, got %#x\n", access); + ok(access == (FILE_READ_ATTRIBUTES | SYNCHRONIZE), "expected FILE_READ_ATTRIBUTES | SYNCHRONIZE, got %#lx\n", access); bytes = 0xdeadbeef; SetLastError(0xdeadbeef); ret = ReadFile(file, buf, sizeof(buf), &bytes, NULL); ok(!ret, "ReadFile should fail\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); - ok(bytes == 0, "expected 0, got %u\n", bytes); + ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); + ok(bytes == 0, "expected 0, got %lu\n", bytes); CloseHandle(file); SetLastError(0xdeadbeef); file = CreateFileA(file_name, GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, 0); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); access = get_obj_access(file); - ok(access == (FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES), "expected FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES, got %#x\n", access); + ok(access == (FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES), "expected FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES, got %#lx\n", access); bytes = 0xdeadbeef; SetLastError(0xdeadbeef); ret = ReadFile(file, buf, sizeof(buf), &bytes, NULL); ok(!ret, "ReadFile should fail\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); - ok(bytes == 0, "expected 0, got %u\n", bytes); + ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); + ok(bytes == 0, "expected 0, got %lu\n", bytes); CloseHandle(file); DeleteFileA(file_name); @@ -5827,20 +5827,20 @@ static void test_file_security(HANDLE token) /* directory */ SetLastError(0xdeadbeef); file = CreateFileA(temp_path, GENERIC_ALL, 0, NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); access = get_obj_access(file); - ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#x\n", access); + ok(access == FILE_ALL_ACCESS, "expected FILE_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), file, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); } @@ -5849,19 +5849,19 @@ static void test_file_security(HANDLE token) SetLastError(0xdeadbeef); file = CreateFileA(temp_path, 0, 0, NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); access = get_obj_access(file); - ok(access == (FILE_READ_ATTRIBUTES | SYNCHRONIZE), "expected FILE_READ_ATTRIBUTES | SYNCHRONIZE, got %#x\n", access); + ok(access == (FILE_READ_ATTRIBUTES | SYNCHRONIZE), "expected FILE_READ_ATTRIBUTES | SYNCHRONIZE, got %#lx\n", access); CloseHandle(file); SetLastError(0xdeadbeef); file = CreateFileA(temp_path, GENERIC_WRITE, 0, NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); access = get_obj_access(file); - ok(access == (FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES), "expected FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES, got %#x\n", access); + ok(access == (FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES), "expected FILE_GENERIC_WRITE | FILE_READ_ATTRIBUTES, got %#lx\n", access); CloseHandle(file); } @@ -5910,7 +5910,7 @@ static void test_filemap_security(void) SetLastError(0xdeadbeef); file = CreateFileA(file_name, GENERIC_READ|GENERIC_WRITE|GENERIC_EXECUTE, 0, NULL, CREATE_ALWAYS, 0, 0); - ok(file != INVALID_HANDLE_VALUE, "CreateFile error %d\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "CreateFile error %ld\n", GetLastError()); SetFilePointer(file, 4096, NULL, FILE_BEGIN); SetEndOfFile(file); @@ -5931,17 +5931,17 @@ static void test_filemap_security(void) continue; } } - ok(mapping != 0, "CreateFileMapping(%04x) error %d\n", prot_map[i].prot, GetLastError()); + ok(mapping != 0, "CreateFileMapping(%04x) error %ld\n", prot_map[i].prot, GetLastError()); } else { ok(!mapping, "CreateFileMapping(%04x) should fail\n", prot_map[i].prot); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); continue; } access = get_obj_access(mapping); - ok(access == prot_map[i].mapped, "%d: expected %#x, got %#x\n", i, prot_map[i].mapped, access); + ok(access == prot_map[i].mapped, "%ld: expected %#x, got %#lx\n", i, prot_map[i].mapped, access); CloseHandle(mapping); } @@ -5956,11 +5956,11 @@ static void test_filemap_security(void) DeleteFileA(file_name); return; } - ok(mapping != 0, "CreateFileMapping error %d\n", GetLastError()); + ok(mapping != 0, "CreateFileMapping error %ld\n", GetLastError()); access = get_obj_access(mapping); ok(access == (STANDARD_RIGHTS_REQUIRED | SECTION_QUERY | SECTION_MAP_READ | SECTION_MAP_WRITE | SECTION_MAP_EXECUTE), - "expected STANDARD_RIGHTS_REQUIRED | SECTION_QUERY | SECTION_MAP_READ | SECTION_MAP_WRITE | SECTION_MAP_EXECUTE, got %#x\n", access); + "expected STANDARD_RIGHTS_REQUIRED | SECTION_QUERY | SECTION_MAP_READ | SECTION_MAP_WRITE | SECTION_MAP_EXECUTE, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { @@ -5969,10 +5969,10 @@ static void test_filemap_security(void) SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), mapping, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); CloseHandle(dup); } @@ -5983,16 +5983,16 @@ static void test_filemap_security(void) created_mapping = CreateFileMappingA(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, 0x1000, "Wine Test Open Mapping"); - ok(created_mapping != NULL, "CreateFileMapping failed with error %u\n", GetLastError()); + ok(created_mapping != NULL, "CreateFileMapping failed with error %lu\n", GetLastError()); for (i = 0; i < ARRAY_SIZE(map); i++) { if (!map[i].generic) continue; mapping = OpenFileMappingA(map[i].generic, FALSE, "Wine Test Open Mapping"); - ok(mapping != NULL, "OpenFileMapping failed with error %d\n", GetLastError()); + ok(mapping != NULL, "OpenFileMapping failed with error %ld\n", GetLastError()); access = get_obj_access(mapping); - ok(access == map[i].mapped, "%d: unexpected access flags %#x, expected %#x\n", + ok(access == map[i].mapped, "%ld: unexpected access flags %#lx, expected %#x\n", i, access, map[i].mapped); CloseHandle(mapping); } @@ -6018,17 +6018,17 @@ static void test_thread_security(void) SetLastError(0xdeadbeef); thread = CreateThread(NULL, 0, (void *)0xdeadbeef, NULL, CREATE_SUSPENDED, &ret); - ok(thread != 0, "CreateThread error %d\n", GetLastError()); + ok(thread != 0, "CreateThread error %ld\n", GetLastError()); access = get_obj_access(thread); - ok(access == THREAD_ALL_ACCESS_NT4 || access == THREAD_ALL_ACCESS_VISTA, "expected THREAD_ALL_ACCESS, got %#x\n", access); + ok(access == THREAD_ALL_ACCESS_NT4 || access == THREAD_ALL_ACCESS_VISTA, "expected THREAD_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), thread, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); switch (map[i].generic) @@ -6038,20 +6038,20 @@ static void test_thread_security(void) ok(access == map[i].mapped || access == (map[i].mapped | THREAD_QUERY_LIMITED_INFORMATION) /* Vista+ */ || access == (map[i].mapped | THREAD_QUERY_LIMITED_INFORMATION | THREAD_RESUME) /* win8 */, - "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; case GENERIC_WRITE: ok(access == map[i].mapped || access == (map[i].mapped | THREAD_SET_LIMITED_INFORMATION) /* Vista+ */ || access == (map[i].mapped | THREAD_SET_LIMITED_INFORMATION | THREAD_RESUME) /* win8 */, - "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; case GENERIC_ALL: ok(access == map[i].mapped || access == THREAD_ALL_ACCESS_VISTA, - "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; default: - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; } @@ -6061,11 +6061,11 @@ static void test_thread_security(void) SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), thread, GetCurrentProcess(), &dup, THREAD_QUERY_INFORMATION, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); ok(access == (THREAD_QUERY_INFORMATION | THREAD_QUERY_LIMITED_INFORMATION) /* Vista+ */ || access == THREAD_QUERY_INFORMATION /* before Vista */, - "expected THREAD_QUERY_INFORMATION|THREAD_QUERY_LIMITED_INFORMATION, got %#x\n", access); + "expected THREAD_QUERY_INFORMATION|THREAD_QUERY_LIMITED_INFORMATION, got %#lx\n", access); CloseHandle(dup); TerminateThread(thread, 0); @@ -6096,45 +6096,45 @@ static void test_process_access(void) sti.cb = sizeof(sti); SetLastError(0xdeadbeef); ret = CreateProcessA(NULL, cmdline, NULL, NULL, FALSE, CREATE_SUSPENDED, NULL, NULL, &sti, &pi); - ok(ret, "CreateProcess() error %d\n", GetLastError()); + ok(ret, "CreateProcess() error %ld\n", GetLastError()); CloseHandle(pi.hThread); process = pi.hProcess; access = get_obj_access(process); - ok(access == PROCESS_ALL_ACCESS_NT4 || access == PROCESS_ALL_ACCESS_VISTA, "expected PROCESS_ALL_ACCESS, got %#x\n", access); + ok(access == PROCESS_ALL_ACCESS_NT4 || access == PROCESS_ALL_ACCESS_VISTA, "expected PROCESS_ALL_ACCESS, got %#lx\n", access); for (i = 0; i < ARRAY_SIZE(map); i++) { SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), process, GetCurrentProcess(), &dup, map[i].generic, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); switch (map[i].generic) { case GENERIC_READ: ok(access == map[i].mapped || access == (map[i].mapped | PROCESS_QUERY_LIMITED_INFORMATION) /* Vista+ */, - "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; case GENERIC_WRITE: ok(access == map[i].mapped || access == (map[i].mapped | PROCESS_TERMINATE) /* before Vista */ || access == (map[i].mapped | PROCESS_SET_LIMITED_INFORMATION) /* win8 */ || access == (map[i].mapped | PROCESS_QUERY_LIMITED_INFORMATION | PROCESS_SET_LIMITED_INFORMATION) /* Win10 Anniversary Update */, - "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; case GENERIC_EXECUTE: ok(access == map[i].mapped || access == (map[i].mapped | PROCESS_QUERY_LIMITED_INFORMATION | PROCESS_TERMINATE) /* Vista+ */, - "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; case GENERIC_ALL: ok(access == map[i].mapped || access == PROCESS_ALL_ACCESS_VISTA, - "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; default: - ok(access == map[i].mapped, "%d: expected %#x, got %#x\n", i, map[i].mapped, access); + ok(access == map[i].mapped, "%ld: expected %#x, got %#lx\n", i, map[i].mapped, access); break; } @@ -6144,11 +6144,11 @@ static void test_process_access(void) SetLastError( 0xdeadbeef ); ret = DuplicateHandle(GetCurrentProcess(), process, GetCurrentProcess(), &dup, PROCESS_QUERY_INFORMATION, FALSE, 0); - ok(ret, "DuplicateHandle error %d\n", GetLastError()); + ok(ret, "DuplicateHandle error %ld\n", GetLastError()); access = get_obj_access(dup); ok(access == (PROCESS_QUERY_INFORMATION | PROCESS_QUERY_LIMITED_INFORMATION) /* Vista+ */ || access == PROCESS_QUERY_INFORMATION /* before Vista */, - "expected PROCESS_QUERY_INFORMATION|PROCESS_QUERY_LIMITED_INFORMATION, got %#x\n", access); + "expected PROCESS_QUERY_INFORMATION|PROCESS_QUERY_LIMITED_INFORMATION, got %#lx\n", access); CloseHandle(dup); TerminateProcess(process, 0); @@ -6165,7 +6165,7 @@ static BOOL validate_impersonation_token(HANDLE token, DWORD *token_type) needed = 0; SetLastError(0xdeadbeef); ret = GetTokenInformation(token, TokenType, &type, sizeof(type), &needed); - ok(ret, "GetTokenInformation error %d\n", GetLastError()); + ok(ret, "GetTokenInformation error %ld\n", GetLastError()); ok(needed == sizeof(type), "GetTokenInformation should return required buffer length\n"); ok(type == TokenPrimary || type == TokenImpersonation, "expected TokenPrimary or TokenImpersonation, got %d\n", type); @@ -6175,7 +6175,7 @@ static BOOL validate_impersonation_token(HANDLE token, DWORD *token_type) needed = 0; SetLastError(0xdeadbeef); ret = GetTokenInformation(token, TokenImpersonationLevel, &sil, sizeof(sil), &needed); - ok(ret, "GetTokenInformation error %d\n", GetLastError()); + ok(ret, "GetTokenInformation error %ld\n", GetLastError()); ok(needed == sizeof(sil), "GetTokenInformation should return required buffer length\n"); ok(sil == SecurityImpersonation, "expected SecurityImpersonation, got %d\n", sil); @@ -6183,7 +6183,7 @@ static BOOL validate_impersonation_token(HANDLE token, DWORD *token_type) SetLastError(0xdeadbeef); ret = GetTokenInformation(token, TokenDefaultDacl, NULL, 0, &needed); ok(!ret, "GetTokenInformation should fail\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); ok(needed != 0xdeadbeef, "GetTokenInformation should return required buffer length\n"); ok(needed > sizeof(TOKEN_DEFAULT_DACL), "GetTokenInformation returned empty default DACL\n"); @@ -6191,7 +6191,7 @@ static BOOL validate_impersonation_token(HANDLE token, DWORD *token_type) SetLastError(0xdeadbeef); ret = GetTokenInformation(token, TokenOwner, NULL, 0, &needed); ok(!ret, "GetTokenInformation should fail\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); ok(needed != 0xdeadbeef, "GetTokenInformation should return required buffer length\n"); ok(needed > sizeof(TOKEN_OWNER), "GetTokenInformation returned empty token owner\n"); @@ -6199,7 +6199,7 @@ static BOOL validate_impersonation_token(HANDLE token, DWORD *token_type) SetLastError(0xdeadbeef); ret = GetTokenInformation(token, TokenPrimaryGroup, NULL, 0, &needed); ok(!ret, "GetTokenInformation should fail\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); ok(needed != 0xdeadbeef, "GetTokenInformation should return required buffer length\n"); ok(needed > sizeof(TOKEN_PRIMARY_GROUP), "GetTokenInformation returned empty token primary group\n"); @@ -6212,18 +6212,18 @@ static void test_kernel_objects_security(void) DWORD ret, token_type; ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE | TOKEN_QUERY, &process_token); - ok(ret, "OpenProcessToken error %d\n", GetLastError()); + ok(ret, "OpenProcessToken error %ld\n", GetLastError()); ret = validate_impersonation_token(process_token, &token_type); - ok(token_type == TokenPrimary, "expected TokenPrimary, got %d\n", token_type); + ok(token_type == TokenPrimary, "expected TokenPrimary, got %ld\n", token_type); ok(!ret, "access token should not be an impersonation token\n"); ret = DuplicateToken(process_token, SecurityImpersonation, &token); - ok(ret, "DuplicateToken error %d\n", GetLastError()); + ok(ret, "DuplicateToken error %ld\n", GetLastError()); ret = validate_impersonation_token(token, &token_type); ok(ret, "access token should be a valid impersonation token\n"); - ok(token_type == TokenImpersonation, "expected TokenImpersonation, got %d\n", token_type); + ok(token_type == TokenImpersonation, "expected TokenImpersonation, got %ld\n", token_type); test_mutex_security(token); test_event_security(token); @@ -6253,7 +6253,7 @@ static void test_TokenIntegrityLevel(void) SetLastError(0xdeadbeef); res = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &token); - ok(res, "got %d with %d (expected TRUE)\n", res, GetLastError()); + ok(res, "got %ld with %ld (expected TRUE)\n", res, GetLastError()); SetLastError(0xdeadbeef); res = GetTokenInformation(token, TokenIntegrityLevel, buffer, sizeof(buffer), &size); @@ -6266,7 +6266,7 @@ static void test_TokenIntegrityLevel(void) return; } - ok(res, "got %u with %u (expected TRUE)\n", res, GetLastError()); + ok(res, "got %lu with %lu (expected TRUE)\n", res, GetLastError()); if (!res) { CloseHandle(token); @@ -6275,7 +6275,7 @@ static void test_TokenIntegrityLevel(void) tml = (TOKEN_MANDATORY_LABEL*) buffer; ok(tml->Label.Attributes == (SE_GROUP_INTEGRITY | SE_GROUP_INTEGRITY_ENABLED), - "got 0x%x (expected 0x%x)\n", tml->Label.Attributes, (SE_GROUP_INTEGRITY | SE_GROUP_INTEGRITY_ENABLED)); + "got 0x%lx (expected 0x%x)\n", tml->Label.Attributes, (SE_GROUP_INTEGRITY | SE_GROUP_INTEGRITY_ENABLED)); ok(EqualSid(tml->Label.Sid, &medium_level) || EqualSid(tml->Label.Sid, &high_level), "got %s (expected %s or %s)\n", debugstr_sid(tml->Label.Sid), @@ -6297,26 +6297,26 @@ static void test_default_dacl_owner_sid(void) sd = HeapAlloc( GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH ); ret = InitializeSecurityDescriptor( sd, SECURITY_DESCRIPTOR_REVISION ); - ok( ret, "error %u\n", GetLastError() ); + ok( ret, "error %lu\n", GetLastError() ); sa.nLength = sizeof(SECURITY_ATTRIBUTES); sa.lpSecurityDescriptor = sd; sa.bInheritHandle = FALSE; handle = CreateEventA( &sa, TRUE, TRUE, "test_event" ); - ok( handle != NULL, "error %u\n", GetLastError() ); + ok( handle != NULL, "error %lu\n", GetLastError() ); size = 0; ret = GetKernelObjectSecurity( handle, OWNER_SECURITY_INFORMATION|DACL_SECURITY_INFORMATION, NULL, 0, &size ); - ok( !ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "error %u\n", GetLastError() ); + ok( !ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, "error %lu\n", GetLastError() ); sd = HeapAlloc( GetProcessHeap(), 0, size ); ret = GetKernelObjectSecurity( handle, OWNER_SECURITY_INFORMATION|DACL_SECURITY_INFORMATION, sd, size, &size ); - ok( ret, "error %u\n", GetLastError() ); + ok( ret, "error %lu\n", GetLastError() ); owner = (void *)0xdeadbeef; defaulted = TRUE; ret = GetSecurityDescriptorOwner( sd, &owner, &defaulted ); - ok( ret, "error %u\n", GetLastError() ); + ok( ret, "error %lu\n", GetLastError() ); ok( owner != (void *)0xdeadbeef, "owner not set\n" ); ok( !defaulted, "owner defaulted\n" ); @@ -6324,7 +6324,7 @@ static void test_default_dacl_owner_sid(void) present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorDacl( sd, &present, &dacl, &defaulted ); - ok( ret, "error %u\n", GetLastError() ); + ok( ret, "error %lu\n", GetLastError() ); ok( present, "dacl not present\n" ); ok( dacl != (void *)0xdeadbeef, "dacl not set\n" ); ok( !defaulted, "dacl defaulted\n" ); @@ -6366,7 +6366,7 @@ static void test_AdjustTokenPrivileges(void) len = 0xdeadbeef; ret = AdjustTokenPrivileges(token, FALSE, &tp, sizeof(TOKEN_PRIVILEGES), NULL, &len); ok(ret, "got %d\n", ret); - ok(len == 0xdeadbeef, "got length %d\n", len); + ok(len == 0xdeadbeef, "got length %ld\n", len); /* revert */ tp.PrivilegeCount = 1; @@ -6393,34 +6393,34 @@ static void test_AddAce(void) memcpy(&ace->SidStart, &sidWorld, sizeof(sidWorld)); ret = InitializeAcl(acl, sizeof(acl_buf), ACL_REVISION2); - ok(ret, "InitializeAcl failed: %d\n", GetLastError()); + ok(ret, "InitializeAcl failed: %ld\n", GetLastError()); ret = AddAce(acl, ACL_REVISION1, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); ret = AddAce(acl, ACL_REVISION2, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); ret = AddAce(acl, ACL_REVISION3, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); ok(acl->AclRevision == ACL_REVISION3, "acl->AclRevision = %d\n", acl->AclRevision); ret = AddAce(acl, ACL_REVISION4, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); ok(acl->AclRevision == ACL_REVISION4, "acl->AclRevision = %d\n", acl->AclRevision); ret = AddAce(acl, ACL_REVISION1, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); ok(acl->AclRevision == ACL_REVISION4, "acl->AclRevision = %d\n", acl->AclRevision); ret = AddAce(acl, ACL_REVISION2, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); ret = AddAce(acl, MIN_ACL_REVISION-1, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); /* next test succeededs but corrupts ACL */ ret = AddAce(acl, MAX_ACL_REVISION+1, MAXDWORD, ace, ace->Header.AceSize); - ok(ret, "AddAce failed: %d\n", GetLastError()); + ok(ret, "AddAce failed: %ld\n", GetLastError()); ok(acl->AclRevision == MAX_ACL_REVISION+1, "acl->AclRevision = %d\n", acl->AclRevision); SetLastError(0xdeadbeef); ret = AddAce(acl, ACL_REVISION1, MAXDWORD, ace, ace->Header.AceSize); ok(!ret, "AddAce succeeded\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "GetLastError() = %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "GetLastError() = %ld\n", GetLastError()); } static void test_AddMandatoryAce(void) @@ -6450,27 +6450,27 @@ static void test_AddMandatoryAce(void) } ret = InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION); - ok(ret, "InitializeSecurityDescriptor failed with error %u\n", GetLastError()); + ok(ret, "InitializeSecurityDescriptor failed with error %lu\n", GetLastError()); sa.nLength = sizeof(sa); sa.lpSecurityDescriptor = sd; sa.bInheritHandle = FALSE; handle = CreateEventA(&sa, TRUE, TRUE, "test_event"); - ok(handle != NULL, "CreateEventA failed with error %u\n", GetLastError()); + ok(handle != NULL, "CreateEventA failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %u, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %u, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); sacl = (void *)0xdeadbeef; present = TRUE; ret = GetSecurityDescriptorSacl(sd2, &present, &sacl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(!present, "SACL is present\n"); ok(sacl == (void *)0xdeadbeef, "SACL is set\n"); @@ -6479,128 +6479,128 @@ static void test_AddMandatoryAce(void) memset(buffer_acl, 0, sizeof(buffer_acl)); ret = InitializeAcl(acl, 256, ACL_REVISION); - ok(ret, "InitializeAcl failed with %u\n", GetLastError()); + ok(ret, "InitializeAcl failed with %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = pAddMandatoryAce(acl, ACL_REVISION, 0, 0x1234, &low_level); ok(!ret, "AddMandatoryAce succeeded\n"); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER got %u\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER got %lu\n", GetLastError()); ret = pAddMandatoryAce(acl, ACL_REVISION, 0, SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, &low_level); - ok(ret, "AddMandatoryAce failed with %u\n", GetLastError()); + ok(ret, "AddMandatoryAce failed with %lu\n", GetLastError()); ret = GetAce(acl, 0, (void **)&ace); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(ace->Header.AceType == SYSTEM_MANDATORY_LABEL_ACE_TYPE, "got type %#x\n", ace->Header.AceType); ok(!ace->Header.AceFlags, "got flags %#x\n", ace->Header.AceFlags); - ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "got mask %#x\n", ace->Mask); + ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "got mask %#lx\n", ace->Mask); ok(EqualSid(&ace->SidStart, &low_level), "wrong sid\n"); SetLastError(0xdeadbeef); ret = GetAce(acl, 1, (void **)&ace); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %lu\n", GetLastError()); ret = SetSecurityDescriptorSacl(sd, TRUE, acl, FALSE); - ok(ret, "SetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); handle = CreateEventA(&sa, TRUE, TRUE, "test_event"); - ok(handle != NULL, "CreateEventA failed with error %u\n", GetLastError()); + ok(handle != NULL, "CreateEventA failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %u, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %u, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); sacl = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorSacl(sd2, &present, &sacl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(present, "SACL not present\n"); ok(sacl != (void *)0xdeadbeef, "SACL not set\n"); ok(!defaulted, "SACL defaulted\n"); ret = GetAclInformation(sacl, &acl_size_info, sizeof(acl_size_info), AclSizeInformation); - ok(ret, "GetAclInformation failed with error %u\n", GetLastError()); - ok(acl_size_info.AceCount == 1, "SACL contains an unexpected ACE count %u\n", acl_size_info.AceCount); + ok(ret, "GetAclInformation failed with error %lu\n", GetLastError()); + ok(acl_size_info.AceCount == 1, "SACL contains an unexpected ACE count %lu\n", acl_size_info.AceCount); ret = GetAce(sacl, 0, (void **)&ace); - ok(ret, "GetAce failed with error %u\n", GetLastError()); + ok(ret, "GetAce failed with error %lu\n", GetLastError()); ok (ace->Header.AceType == SYSTEM_MANDATORY_LABEL_ACE_TYPE, "Unexpected ACE type %#x\n", ace->Header.AceType); ok(!ace->Header.AceFlags, "Unexpected ACE flags %#x\n", ace->Header.AceFlags); - ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "Unexpected ACE mask %#x\n", ace->Mask); + ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "Unexpected ACE mask %#lx\n", ace->Mask); ok(EqualSid(&ace->SidStart, &low_level), "Expected low integrity level\n"); HeapFree(GetProcessHeap(), 0, sd2); ret = pAddMandatoryAce(acl, ACL_REVISION, 0, SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP, &medium_level); - ok(ret, "AddMandatoryAce failed with error %u\n", GetLastError()); + ok(ret, "AddMandatoryAce failed with error %lu\n", GetLastError()); ret = SetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd); - ok(ret, "SetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "SetKernelObjectSecurity failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %u, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %u, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); sacl = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorSacl(sd2, &present, &sacl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(present, "SACL not present\n"); ok(sacl != (void *)0xdeadbeef, "SACL not set\n"); ok(sacl->AceCount == 2, "Expected 2 ACEs, got %d\n", sacl->AceCount); ok(!defaulted, "SACL defaulted\n"); ret = GetAce(acl, 0, (void **)&ace); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(ace->Header.AceType == SYSTEM_MANDATORY_LABEL_ACE_TYPE, "got type %#x\n", ace->Header.AceType); ok(!ace->Header.AceFlags, "got flags %#x\n", ace->Header.AceFlags); - ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "got mask %#x\n", ace->Mask); + ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "got mask %#lx\n", ace->Mask); ok(EqualSid(&ace->SidStart, &low_level), "wrong sid\n"); ret = GetAce(acl, 1, (void **)&ace); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(ace->Header.AceType == SYSTEM_MANDATORY_LABEL_ACE_TYPE, "got type %#x\n", ace->Header.AceType); ok(!ace->Header.AceFlags, "got flags %#x\n", ace->Header.AceFlags); - ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP, "got mask %#x\n", ace->Mask); + ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP, "got mask %#lx\n", ace->Mask); ok(EqualSid(&ace->SidStart, &medium_level), "wrong sid\n"); SetLastError(0xdeadbeef); ret = GetAce(acl, 2, (void **)&ace); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %lu\n", GetLastError()); HeapFree(GetProcessHeap(), 0, sd2); ret = SetSecurityDescriptorSacl(sd, FALSE, NULL, FALSE); - ok(ret, "SetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ret = SetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd); - ok(ret, "SetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "SetKernelObjectSecurity failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); sacl = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorSacl(sd2, &present, &sacl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(present, "SACL not present\n"); ok(sacl && sacl != (void *)0xdeadbeef, "SACL not set\n"); ok(!defaulted, "SACL defaulted\n"); @@ -6609,30 +6609,30 @@ static void test_AddMandatoryAce(void) HeapFree(GetProcessHeap(), 0, sd2); ret = InitializeAcl(acl, 256, ACL_REVISION); - ok(ret, "InitializeAcl failed with error %u\n", GetLastError()); + ok(ret, "InitializeAcl failed with error %lu\n", GetLastError()); ret = pAddMandatoryAce(acl, ACL_REVISION3, 0, SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP, &medium_level); - ok(ret, "AddMandatoryAce failed with error %u\n", GetLastError()); + ok(ret, "AddMandatoryAce failed with error %lu\n", GetLastError()); ret = SetSecurityDescriptorSacl(sd, TRUE, acl, FALSE); - ok(ret, "SetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ret = SetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd); - ok(ret, "SetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "SetKernelObjectSecurity failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); sacl = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorSacl(sd2, &present, &sacl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(present, "SACL not present\n"); ok(sacl != (void *)0xdeadbeef, "SACL not set\n"); ok(sacl->AclRevision == ACL_REVISION3, "Expected revision 3, got %d\n", sacl->AclRevision); @@ -6641,33 +6641,33 @@ static void test_AddMandatoryAce(void) HeapFree(GetProcessHeap(), 0, sd2); ret = InitializeAcl(acl, 256, ACL_REVISION); - ok(ret, "InitializeAcl failed with error %u\n", GetLastError()); + ok(ret, "InitializeAcl failed with error %lu\n", GetLastError()); ret = AllocateAndInitializeSid(&sia_world, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, (void **)&everyone); - ok(ret, "AllocateAndInitializeSid failed with error %u\n", GetLastError()); + ok(ret, "AllocateAndInitializeSid failed with error %lu\n", GetLastError()); ret = AddAccessAllowedAce(acl, ACL_REVISION, KEY_READ, everyone); - ok(ret, "AddAccessAllowedAce failed with error %u\n", GetLastError()); + ok(ret, "AddAccessAllowedAce failed with error %lu\n", GetLastError()); ret = SetSecurityDescriptorSacl(sd, TRUE, acl, FALSE); - ok(ret, "SetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ret = SetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd); - ok(ret, "SetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "SetKernelObjectSecurity failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(handle, LABEL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); sacl = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorSacl(sd2, &present, &sacl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(present, "SACL not present\n"); ok(sacl && sacl != (void *)0xdeadbeef, "SACL not set\n"); ok(!defaulted, "SACL defaulted\n"); @@ -6707,7 +6707,7 @@ static void test_system_security_access(void) CloseHandle( token ); return; } - todo_wine ok( res == ERROR_PRIVILEGE_NOT_HELD, "got %d\n", res ); + todo_wine ok( res == ERROR_PRIVILEGE_NOT_HELD, "got %ld\n", res ); priv.PrivilegeCount = 1; priv.Privileges[0].Luid = luid; @@ -6715,7 +6715,7 @@ static void test_system_security_access(void) priv_prev = HeapAlloc( GetProcessHeap(), 0, len ); ret = AdjustTokenPrivileges( token, FALSE, &priv, len, priv_prev, &len ); - ok( ret, "got %u\n", GetLastError()); + ok( ret, "got %lu\n", GetLastError()); res = RegCreateKeyExW( HKEY_LOCAL_MACHINE, testkeyW, 0, NULL, 0, KEY_READ|ACCESS_SYSTEM_SECURITY, NULL, &hkey, NULL ); if (res == ERROR_PRIVILEGE_NOT_HELD) @@ -6725,16 +6725,16 @@ static void test_system_security_access(void) CloseHandle( token ); return; } - ok( !res, "got %d\n", res ); + ok( !res, "got %ld\n", res ); /* restore privileges */ ret = AdjustTokenPrivileges( token, FALSE, priv_prev, 0, NULL, NULL ); - ok( ret, "got %u\n", GetLastError() ); + ok( ret, "got %lu\n", GetLastError() ); HeapFree( GetProcessHeap(), 0, priv_prev ); /* privilege is checked on access */ err = GetSecurityInfo( hkey, SE_REGISTRY_KEY, SACL_SECURITY_INFORMATION, NULL, NULL, NULL, &sacl, &sd ); - todo_wine ok( err == ERROR_PRIVILEGE_NOT_HELD || err == ERROR_ACCESS_DENIED, "got %u\n", err ); + todo_wine ok( err == ERROR_PRIVILEGE_NOT_HELD || err == ERROR_ACCESS_DENIED, "got %lu\n", err ); if (err == ERROR_SUCCESS) LocalFree( sd ); @@ -6744,38 +6744,38 @@ static void test_system_security_access(void) priv_prev = HeapAlloc( GetProcessHeap(), 0, len ); ret = AdjustTokenPrivileges( token, FALSE, &priv, len, priv_prev, &len ); - ok( ret, "got %u\n", GetLastError()); + ok( ret, "got %lu\n", GetLastError()); err = GetSecurityInfo( hkey, SE_REGISTRY_KEY, SACL_SECURITY_INFORMATION, NULL, NULL, NULL, &sacl, &sd ); - ok( err == ERROR_SUCCESS, "got %u\n", err ); + ok( err == ERROR_SUCCESS, "got %lu\n", err ); RegCloseKey( hkey ); LocalFree( sd ); /* handle created without ACCESS_SYSTEM_SECURITY, privilege held */ res = RegCreateKeyExW( HKEY_LOCAL_MACHINE, testkeyW, 0, NULL, 0, KEY_READ, NULL, &hkey, NULL ); - ok( res == ERROR_SUCCESS, "got %d\n", res ); + ok( res == ERROR_SUCCESS, "got %ld\n", res ); sd = NULL; err = GetSecurityInfo( hkey, SE_REGISTRY_KEY, SACL_SECURITY_INFORMATION, NULL, NULL, NULL, &sacl, &sd ); - todo_wine ok( err == ERROR_SUCCESS, "got %u\n", err ); + todo_wine ok( err == ERROR_SUCCESS, "got %lu\n", err ); RegCloseKey( hkey ); LocalFree( sd ); /* restore privileges */ ret = AdjustTokenPrivileges( token, FALSE, priv_prev, 0, NULL, NULL ); - ok( ret, "got %u\n", GetLastError() ); + ok( ret, "got %lu\n", GetLastError() ); HeapFree( GetProcessHeap(), 0, priv_prev ); /* handle created without ACCESS_SYSTEM_SECURITY, privilege not held */ res = RegCreateKeyExW( HKEY_LOCAL_MACHINE, testkeyW, 0, NULL, 0, KEY_READ, NULL, &hkey, NULL ); - ok( res == ERROR_SUCCESS, "got %d\n", res ); + ok( res == ERROR_SUCCESS, "got %ld\n", res ); err = GetSecurityInfo( hkey, SE_REGISTRY_KEY, SACL_SECURITY_INFORMATION, NULL, NULL, NULL, &sacl, &sd ); - ok( err == ERROR_PRIVILEGE_NOT_HELD || err == ERROR_ACCESS_DENIED, "got %u\n", err ); + ok( err == ERROR_PRIVILEGE_NOT_HELD || err == ERROR_ACCESS_DENIED, "got %lu\n", err ); RegCloseKey( hkey ); res = RegDeleteKeyW( HKEY_LOCAL_MACHINE, testkeyW ); - ok( !res, "got %d\n", res ); + ok( !res, "got %ld\n", res ); CloseHandle( token ); } @@ -6810,46 +6810,46 @@ static void test_GetWindowsAccountDomainSid(void) bret = GetTokenInformation(token, TokenUser, NULL, 0, &sid_size); ok(!bret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); user = HeapAlloc(GetProcessHeap(), 0, sid_size); bret = GetTokenInformation(token, TokenUser, user, sid_size, &sid_size); - ok(bret, "GetTokenInformation(TokenUser) failed with error %d\n", GetLastError()); + ok(bret, "GetTokenInformation(TokenUser) failed with error %ld\n", GetLastError()); CloseHandle(token); user_sid = ((TOKEN_USER *)user)->User.Sid; SetLastError(0xdeadbeef); bret = pGetWindowsAccountDomainSid(0, 0, 0); ok(!bret, "GetWindowsAccountDomainSid succeeded\n"); - ok(GetLastError() == ERROR_INVALID_SID, "expected ERROR_INVALID_SID, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_SID, "expected ERROR_INVALID_SID, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); bret = pGetWindowsAccountDomainSid(user_sid, 0, 0); ok(!bret, "GetWindowsAccountDomainSid succeeded\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); sid_size = SECURITY_MAX_SID_SIZE; SetLastError(0xdeadbeef); bret = pGetWindowsAccountDomainSid(user_sid, 0, &sid_size); ok(!bret, "GetWindowsAccountDomainSid succeeded\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); - ok(sid_size == GetSidLengthRequired(4), "expected size %d, got %d\n", GetSidLengthRequired(4), sid_size); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); + ok(sid_size == GetSidLengthRequired(4), "expected size %ld, got %ld\n", GetSidLengthRequired(4), sid_size); SetLastError(0xdeadbeef); bret = pGetWindowsAccountDomainSid(user_sid, domain_sid, 0); ok(!bret, "GetWindowsAccountDomainSid succeeded\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); sid_size = 1; SetLastError(0xdeadbeef); bret = pGetWindowsAccountDomainSid(user_sid, domain_sid, &sid_size); ok(!bret, "GetWindowsAccountDomainSid succeeded\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(sid_size == GetSidLengthRequired(4), "expected size %d, got %d\n", GetSidLengthRequired(4), sid_size); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(sid_size == GetSidLengthRequired(4), "expected size %ld, got %ld\n", GetSidLengthRequired(4), sid_size); sid_size = SECURITY_MAX_SID_SIZE; bret = pGetWindowsAccountDomainSid(user_sid, domain_sid, &sid_size); - ok(bret, "GetWindowsAccountDomainSid failed with error %d\n", GetLastError()); - ok(sid_size == GetSidLengthRequired(4), "expected size %d, got %d\n", GetSidLengthRequired(4), sid_size); + ok(bret, "GetWindowsAccountDomainSid failed with error %ld\n", GetLastError()); + ok(sid_size == GetSidLengthRequired(4), "expected size %ld, got %ld\n", GetSidLengthRequired(4), sid_size); InitializeSid(domain_sid2, &domain_ident, 4); for (i = 0; i < 4; i++) *GetSidSubAuthority(domain_sid2, i) = *GetSidSubAuthority(user_sid, i); @@ -6879,12 +6879,12 @@ static void test_GetSidIdentifierAuthority(void) SetLastError(0xdeadbeef); id = GetSidIdentifierAuthority(authority_sid); ok(id != NULL, "got NULL pointer as identifier authority\n"); - ok(GetLastError() == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %u\n", GetLastError()); + ok(GetLastError() == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %lu\n", GetLastError()); SetLastError(0xdeadbeef); id = GetSidIdentifierAuthority(NULL); ok(id != NULL, "got NULL pointer as identifier authority\n"); - ok(GetLastError() == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %u\n", GetLastError()); + ok(GetLastError() == ERROR_SUCCESS, "expected ERROR_SUCCESS, got %lu\n", GetLastError()); } static void test_pseudo_tokens(void) @@ -6895,10 +6895,10 @@ static void test_pseudo_tokens(void) BOOL ret; ret = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &token); - ok(ret, "OpenProcessToken failed with error %u\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %lu\n", GetLastError()); memset(&statistics1, 0x11, sizeof(statistics1)); ret = GetTokenInformation(token, TokenStatistics, &statistics1, sizeof(statistics1), &retlen); - ok(ret, "GetTokenInformation failed with %u\n", GetLastError()); + ok(ret, "GetTokenInformation failed with %lu\n", GetLastError()); CloseHandle(token); /* test GetCurrentProcessToken() */ @@ -6907,7 +6907,7 @@ static void test_pseudo_tokens(void) ret = GetTokenInformation(GetCurrentProcessToken(), TokenStatistics, &statistics2, sizeof(statistics2), &retlen); ok(ret || broken(GetLastError() == ERROR_INVALID_HANDLE), - "GetTokenInformation failed with %u\n", GetLastError()); + "GetTokenInformation failed with %lu\n", GetLastError()); if (ret) ok(!memcmp(&statistics1, &statistics2, sizeof(statistics1)), "Token statistics do not match\n"); else @@ -6919,7 +6919,7 @@ static void test_pseudo_tokens(void) ret = GetTokenInformation(GetCurrentThreadEffectiveToken(), TokenStatistics, &statistics2, sizeof(statistics2), &retlen); ok(ret || broken(GetLastError() == ERROR_INVALID_HANDLE), - "GetTokenInformation failed with %u\n", GetLastError()); + "GetTokenInformation failed with %lu\n", GetLastError()); if (ret) ok(!memcmp(&statistics1, &statistics2, sizeof(statistics1)), "Token statistics do not match\n"); else @@ -6928,14 +6928,14 @@ static void test_pseudo_tokens(void) SetLastError(0xdeadbeef); ret = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, TRUE, &token); ok(!ret, "OpenThreadToken should have failed\n"); - ok(GetLastError() == ERROR_NO_TOKEN, "Expected ERROR_NO_TOKEN, got %u\n", GetLastError()); + ok(GetLastError() == ERROR_NO_TOKEN, "Expected ERROR_NO_TOKEN, got %lu\n", GetLastError()); /* test GetCurrentThreadToken() */ SetLastError(0xdeadbeef); ret = GetTokenInformation(GetCurrentThreadToken(), TokenStatistics, &statistics2, sizeof(statistics2), &retlen); todo_wine ok(GetLastError() == ERROR_NO_TOKEN || broken(GetLastError() == ERROR_INVALID_HANDLE), - "Expected ERROR_NO_TOKEN, got %u\n", GetLastError()); + "Expected ERROR_NO_TOKEN, got %lu\n", GetLastError()); } static void test_maximum_allowed(void) @@ -6958,21 +6958,21 @@ static void test_maximum_allowed(void) } ret = InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION); - ok(ret, "InitializeSecurityDescriptor failed with %u\n", GetLastError()); + ok(ret, "InitializeSecurityDescriptor failed with %lu\n", GetLastError()); memset(buffer_acl, 0, sizeof(buffer_acl)); ret = InitializeAcl(acl, 256, ACL_REVISION); - ok(ret, "InitializeAcl failed with %u\n", GetLastError()); + ok(ret, "InitializeAcl failed with %lu\n", GetLastError()); ret = SetSecurityDescriptorDacl(sd, TRUE, acl, FALSE); - ok(ret, "SetSecurityDescriptorDacl failed with %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorDacl failed with %lu\n", GetLastError()); sa.nLength = sizeof(SECURITY_ATTRIBUTES); sa.lpSecurityDescriptor = sd; sa.bInheritHandle = FALSE; handle = pCreateEventExA(&sa, NULL, 0, MAXIMUM_ALLOWED | 0x4); - ok(handle != NULL, "CreateEventExA failed with error %u\n", GetLastError()); + ok(handle != NULL, "CreateEventExA failed with error %lu\n", GetLastError()); mask = get_obj_access(handle); - ok(mask == EVENT_ALL_ACCESS, "Expected %x, got %x\n", EVENT_ALL_ACCESS, mask); + ok(mask == EVENT_ALL_ACCESS, "Expected %x, got %lx\n", EVENT_ALL_ACCESS, mask); CloseHandle(handle); } @@ -6999,51 +6999,51 @@ static void test_token_label(void) } ret = OpenProcessToken(GetCurrentProcess(), READ_CONTROL | WRITE_OWNER, &token); - ok(ret, "OpenProcessToken failed with error %u\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(token, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(token, LABEL_SECURITY_INFORMATION, sd, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); ret = GetSecurityDescriptorControl(sd, &control, &revision); - ok(ret, "GetSecurityDescriptorControl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorControl failed with error %lu\n", GetLastError()); todo_wine ok(control == (SE_SELF_RELATIVE | SE_SACL_AUTO_INHERITED | SE_SACL_PRESENT), "Unexpected security descriptor control %#x\n", control); - ok(revision == 1, "Unexpected security descriptor revision %u\n", revision); + ok(revision == 1, "Unexpected security descriptor revision %lu\n", revision); sid = (void *)0xdeadbeef; defaulted = TRUE; ret = GetSecurityDescriptorOwner(sd, (void **)&sid, &defaulted); - ok(ret, "GetSecurityDescriptorOwner failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorOwner failed with error %lu\n", GetLastError()); ok(!sid, "Owner present\n"); ok(!defaulted, "Owner defaulted\n"); sid = (void *)0xdeadbeef; defaulted = TRUE; ret = GetSecurityDescriptorGroup(sd, (void **)&sid, &defaulted); - ok(ret, "GetSecurityDescriptorGroup failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorGroup failed with error %lu\n", GetLastError()); ok(!sid, "Group present\n"); ok(!defaulted, "Group defaulted\n"); ret = GetSecurityDescriptorSacl(sd, &present, &sacl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(present, "No SACL in the security descriptor\n"); ok(!!sacl, "NULL SACL in the security descriptor\n"); ok(!defaulted, "SACL defaulted\n"); ok(sacl->AceCount == 1, "SACL contains an unexpected ACE count %u\n", sacl->AceCount); ret = GetAce(sacl, 0, (void **)&ace); - ok(ret, "GetAce failed with error %u\n", GetLastError()); + ok(ret, "GetAce failed with error %lu\n", GetLastError()); ok(ace->Header.AceType == SYSTEM_MANDATORY_LABEL_ACE_TYPE, "Unexpected ACE type %#x\n", ace->Header.AceType); ok(!ace->Header.AceFlags, "Unexpected ACE flags %#x\n", ace->Header.AceFlags); ok(ace->Header.AceSize, "Unexpected ACE size %u\n", ace->Header.AceSize); - ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "Unexpected ACE mask %#x\n", ace->Mask); + ok(ace->Mask == SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, "Unexpected ACE mask %#lx\n", ace->Mask); sid = (SID *)&ace->SidStart; ConvertSidToStringSidA(sid, &str); @@ -7051,7 +7051,7 @@ static void test_token_label(void) LocalFree(str); ret = GetSecurityDescriptorDacl(sd, &present, &dacl, &defaulted); - ok(ret, "GetSecurityDescriptorDacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorDacl failed with error %lu\n", GetLastError()); todo_wine ok(!present, "DACL present\n"); HeapFree(GetProcessHeap(), 0, sd); @@ -7084,51 +7084,51 @@ static void test_token_security_descriptor(void) /* Test whether we can create tokens with security descriptors */ ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &token); - ok(ret, "OpenProcessToken failed with error %u\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %lu\n", GetLastError()); ret = InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION); - ok(ret, "InitializeSecurityDescriptor failed with error %u\n", GetLastError()); + ok(ret, "InitializeSecurityDescriptor failed with error %lu\n", GetLastError()); memset(buffer_acl, 0, sizeof(buffer_acl)); ret = InitializeAcl(acl, 256, ACL_REVISION); - ok(ret, "InitializeAcl failed with error %u\n", GetLastError()); + ok(ret, "InitializeAcl failed with error %lu\n", GetLastError()); ret = ConvertStringSidToSidA("S-1-5-6", &psid); - ok(ret, "ConvertStringSidToSidA failed with error %u\n", GetLastError()); + ok(ret, "ConvertStringSidToSidA failed with error %lu\n", GetLastError()); ret = pAddAccessAllowedAceEx(acl, ACL_REVISION, NO_PROPAGATE_INHERIT_ACE, GENERIC_ALL, psid); - ok(ret, "AddAccessAllowedAceEx failed with error %u\n", GetLastError()); + ok(ret, "AddAccessAllowedAceEx failed with error %lu\n", GetLastError()); ret = SetSecurityDescriptorDacl(sd, TRUE, acl, FALSE); - ok(ret, "SetSecurityDescriptorDacl failed with error %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorDacl failed with error %lu\n", GetLastError()); sa.nLength = sizeof(SECURITY_ATTRIBUTES); sa.lpSecurityDescriptor = sd; sa.bInheritHandle = FALSE; ret = pDuplicateTokenEx(token, MAXIMUM_ALLOWED, &sa, SecurityImpersonation, TokenImpersonation, &token2); - ok(ret, "DuplicateTokenEx failed with error %u\n", GetLastError()); + ok(ret, "DuplicateTokenEx failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(token2, DACL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(token2, DACL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); acl2 = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorDacl(sd2, &present, &acl2, &defaulted); - ok(ret, "GetSecurityDescriptorDacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorDacl failed with error %lu\n", GetLastError()); ok(present, "acl2 not present\n"); ok(acl2 != (void *)0xdeadbeef, "acl2 not set\n"); ok(acl2->AceCount == 1, "Expected 1 ACE, got %d\n", acl2->AceCount); ok(!defaulted, "acl2 defaulted\n"); ret = GetAce(acl2, 0, (void **)&ace); - ok(ret, "GetAce failed with error %u\n", GetLastError()); + ok(ret, "GetAce failed with error %lu\n", GetLastError()); ok(ace->Header.AceType == ACCESS_ALLOWED_ACE_TYPE, "Unexpected ACE type %#x\n", ace->Header.AceType); ok(EqualSid(&ace->SidStart, psid), "Expected access allowed ACE\n"); ok(ace->Header.AceFlags == NO_PROPAGATE_INHERIT_ACE, @@ -7139,21 +7139,21 @@ static void test_token_security_descriptor(void) /* Duplicate token without security attributes. * Tokens do not inherit the security descriptor in DuplicateToken. */ ret = pDuplicateTokenEx(token2, MAXIMUM_ALLOWED, NULL, SecurityImpersonation, TokenImpersonation, &token3); - ok(ret, "DuplicateTokenEx failed with error %u\n", GetLastError()); + ok(ret, "DuplicateTokenEx failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(token3, DACL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(token3, DACL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); acl2 = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorDacl(sd2, &present, &acl2, &defaulted); - ok(ret, "GetSecurityDescriptorDacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorDacl failed with error %lu\n", GetLastError()); todo_wine ok(present, "DACL not present\n"); @@ -7178,17 +7178,17 @@ static void test_token_security_descriptor(void) * the parent but not the DACL of the token */ ret = GetKernelObjectSecurity(token, DACL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd2 = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(token, DACL_SECURITY_INFORMATION, sd2, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); acl2 = (void *)0xdeadbeef; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorDacl(sd2, &present, &acl2, &defaulted); - ok(ret, "GetSecurityDescriptorDacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorDacl failed with error %lu\n", GetLastError()); ok(present, "DACL not present\n"); ok(acl2 != (void *)0xdeadbeef, "DACL not set\n"); ok(!defaulted, "DACL defaulted\n"); @@ -7203,36 +7203,36 @@ static void test_token_security_descriptor(void) exp_access.Trustee.ptstrName = (void*)psid; retd = pSetEntriesInAclW(1, &exp_access, acl2, &acl_child); - ok(retd == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %u\n", retd); + ok(retd == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %lu\n", retd); memset(sd, 0, sizeof(buffer_sd)); ret = InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION); - ok(ret, "InitializeSecurityDescriptor failed with error %u\n", GetLastError()); + ok(ret, "InitializeSecurityDescriptor failed with error %lu\n", GetLastError()); ret = SetSecurityDescriptorDacl(sd, TRUE, acl_child, FALSE); - ok(ret, "SetSecurityDescriptorDacl failed with error %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorDacl failed with error %lu\n", GetLastError()); ret = SetKernelObjectSecurity(token, DACL_SECURITY_INFORMATION, sd); - ok(ret, "SetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "SetKernelObjectSecurity failed with error %lu\n", GetLastError()); /* The security label is also not inherited */ if (pAddMandatoryAce) { ret = InitializeAcl(acl, 256, ACL_REVISION); - ok(ret, "InitializeAcl failed with error %u\n", GetLastError()); + ok(ret, "InitializeAcl failed with error %lu\n", GetLastError()); ret = pAddMandatoryAce(acl, ACL_REVISION, 0, SYSTEM_MANDATORY_LABEL_NO_WRITE_UP, &low_level); - ok(ret, "AddMandatoryAce failed with error %u\n", GetLastError()); + ok(ret, "AddMandatoryAce failed with error %lu\n", GetLastError()); memset(sd, 0, sizeof(buffer_sd)); ret = InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION); - ok(ret, "InitializeSecurityDescriptor failed with error %u\n", GetLastError()); + ok(ret, "InitializeSecurityDescriptor failed with error %lu\n", GetLastError()); ret = SetSecurityDescriptorSacl(sd, TRUE, acl, FALSE); - ok(ret, "SetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "SetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ret = SetKernelObjectSecurity(token, LABEL_SECURITY_INFORMATION, sd); - ok(ret, "SetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "SetKernelObjectSecurity failed with error %lu\n", GetLastError()); } else win_skip("SYSTEM_MANDATORY_LABEL not supported\n"); @@ -7245,7 +7245,7 @@ static void test_token_security_descriptor(void) sprintf(buffer, "%s security test_token_sd", myARGV[0]); ret = CreateProcessA(NULL, buffer, NULL, NULL, FALSE, 0, NULL, NULL, &startup, &info); - ok(ret, "CreateProcess failed with error %u\n", GetLastError()); + ok(ret, "CreateProcess failed with error %lu\n", GetLastError()); wait_child_process(info.hProcess); CloseHandle(info.hProcess); CloseHandle(info.hThread); @@ -7273,24 +7273,24 @@ static void test_child_token_sd(void) ACL *acl; ret = ConvertStringSidToSidA("S-1-5-6", &psid); - ok(ret, "ConvertStringSidToSidA failed with error %u\n", GetLastError()); + ok(ret, "ConvertStringSidToSidA failed with error %lu\n", GetLastError()); ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &token); - ok(ret, "OpenProcessToken failed with error %u\n", GetLastError()); + ok(ret, "OpenProcessToken failed with error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(token, DACL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(token, DACL_SECURITY_INFORMATION, sd, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); acl = NULL; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorDacl(sd, &present, &acl, &defaulted); - ok(ret, "GetSecurityDescriptorDacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorDacl failed with error %lu\n", GetLastError()); ok(present, "DACL not present\n"); ok(acl && acl != (void *)0xdeadbeef, "Got invalid DACL\n"); ok(!defaulted, "DACL defaulted\n"); @@ -7299,7 +7299,7 @@ static void test_child_token_sd(void) for (i = 0; i < acl->AceCount; i++) { ret = GetAce(acl, i, (void **)&acc_ace); - ok(ret, "GetAce failed with error %u\n", GetLastError()); + ok(ret, "GetAce failed with error %lu\n", GetLastError()); ok(acc_ace->Header.AceType != ACCESS_ALLOWED_ACE_TYPE || !EqualSid(&acc_ace->SidStart, psid), "ACE inherited from the parent\n"); } @@ -7315,23 +7315,23 @@ static void test_child_token_sd(void) ret = GetKernelObjectSecurity(token, LABEL_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Unexpected GetKernelObjectSecurity return value %d, error %u\n", ret, GetLastError()); + "Unexpected GetKernelObjectSecurity return value %d, error %lu\n", ret, GetLastError()); sd = HeapAlloc(GetProcessHeap(), 0, size); ret = GetKernelObjectSecurity(token, LABEL_SECURITY_INFORMATION, sd, size, &size); - ok(ret, "GetKernelObjectSecurity failed with error %u\n", GetLastError()); + ok(ret, "GetKernelObjectSecurity failed with error %lu\n", GetLastError()); acl = NULL; present = FALSE; defaulted = TRUE; ret = GetSecurityDescriptorSacl(sd, &present, &acl, &defaulted); - ok(ret, "GetSecurityDescriptorSacl failed with error %u\n", GetLastError()); + ok(ret, "GetSecurityDescriptorSacl failed with error %lu\n", GetLastError()); ok(present, "SACL not present\n"); ok(acl && acl != (void *)0xdeadbeef, "Got invalid SACL\n"); ok(!defaulted, "SACL defaulted\n"); ok(acl->AceCount == 1, "Expected exactly one ACE\n"); ret = GetAce(acl, 0, (void **)&ace_label); - ok(ret, "GetAce failed with error %u\n", GetLastError()); + ok(ret, "GetAce failed with error %lu\n", GetLastError()); ok(ace_label->Header.AceType == SYSTEM_MANDATORY_LABEL_ACE_TYPE, "Unexpected ACE type %#x\n", ace_label->Header.AceType); ok(!EqualSid(&ace_label->SidStart, &low_level), @@ -7372,26 +7372,26 @@ static void test_GetExplicitEntriesFromAclW(void) HeapFree(GetProcessHeap(), 0, old_acl); return; } - ok(res, "InitializeAcl failed with error %d\n", GetLastError()); + ok(res, "InitializeAcl failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid(&SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &everyone_sid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AllocateAndInitializeSid(&SIDAuthNT, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS, 0, 0, 0, 0, 0, 0, &users_sid); - ok(res, "AllocateAndInitializeSid failed with error %d\n", GetLastError()); + ok(res, "AllocateAndInitializeSid failed with error %ld\n", GetLastError()); res = AddAccessAllowedAce(old_acl, ACL_REVISION, KEY_READ, users_sid); - ok(res, "AddAccessAllowedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessAllowedAce failed with error %ld\n", GetLastError()); access2 = NULL; res = pGetExplicitEntriesFromAclW(old_acl, &count, &access2); - ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %d\n", GetLastError()); - ok(count == 1, "Expected count == 1, got %d\n", count); + ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %ld\n", GetLastError()); + ok(count == 1, "Expected count == 1, got %ld\n", count); ok(access2[0].grfAccessMode == GRANT_ACCESS, "Expected GRANT_ACCESS, got %d\n", access2[0].grfAccessMode); - ok(access2[0].grfAccessPermissions == KEY_READ, "Expected KEY_READ, got %d\n", access2[0].grfAccessPermissions); + ok(access2[0].grfAccessPermissions == KEY_READ, "Expected KEY_READ, got %ld\n", access2[0].grfAccessPermissions); ok(access2[0].Trustee.TrusteeForm == TRUSTEE_IS_SID, "Expected SID trustee, got %d\n", access2[0].Trustee.TrusteeForm); - ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %x\n", access2[0].grfInheritance); + ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %lx\n", access2[0].grfInheritance); ok(EqualSid(access2[0].Trustee.ptstrName, users_sid), "Expected equal SIDs\n"); LocalFree(access2); @@ -7405,38 +7405,38 @@ static void test_GetExplicitEntriesFromAclW(void) access.Trustee.TrusteeForm = TRUSTEE_IS_SID; access.Trustee.ptstrName = everyone_sid; res = pSetEntriesInAclW(1, &access, old_acl, &new_acl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(new_acl != NULL, "returned acl was NULL\n"); access2 = NULL; res = pGetExplicitEntriesFromAclW(new_acl, &count, &access2); - ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %d\n", GetLastError()); - ok(count == 2, "Expected count == 2, got %d\n", count); + ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %ld\n", GetLastError()); + ok(count == 2, "Expected count == 2, got %ld\n", count); ok(access2[0].grfAccessMode == GRANT_ACCESS, "Expected GRANT_ACCESS, got %d\n", access2[0].grfAccessMode); - ok(access2[0].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %d\n", access2[0].grfAccessPermissions); + ok(access2[0].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %ld\n", access2[0].grfAccessPermissions); ok(access2[0].Trustee.TrusteeType == TRUSTEE_IS_UNKNOWN, "Expected TRUSTEE_IS_UNKNOWN trustee type, got %d\n", access2[0].Trustee.TrusteeType); ok(access2[0].Trustee.TrusteeForm == TRUSTEE_IS_SID, "Expected SID trustee, got %d\n", access2[0].Trustee.TrusteeForm); - ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %x\n", access2[0].grfInheritance); + ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %lx\n", access2[0].grfInheritance); ok(EqualSid(access2[0].Trustee.ptstrName, everyone_sid), "Expected equal SIDs\n"); LocalFree(access2); LocalFree(new_acl); access.Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN; res = pSetEntriesInAclW(1, &access, old_acl, &new_acl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(new_acl != NULL, "returned acl was NULL\n"); access2 = NULL; res = pGetExplicitEntriesFromAclW(new_acl, &count, &access2); - ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %d\n", GetLastError()); - ok(count == 2, "Expected count == 2, got %d\n", count); + ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %ld\n", GetLastError()); + ok(count == 2, "Expected count == 2, got %ld\n", count); ok(access2[0].grfAccessMode == GRANT_ACCESS, "Expected GRANT_ACCESS, got %d\n", access2[0].grfAccessMode); - ok(access2[0].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %d\n", access2[0].grfAccessPermissions); + ok(access2[0].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %ld\n", access2[0].grfAccessPermissions); ok(access2[0].Trustee.TrusteeType == TRUSTEE_IS_UNKNOWN, "Expected TRUSTEE_IS_UNKNOWN trustee type, got %d\n", access2[0].Trustee.TrusteeType); ok(access2[0].Trustee.TrusteeForm == TRUSTEE_IS_SID, "Expected SID trustee, got %d\n", access2[0].Trustee.TrusteeForm); - ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %x\n", access2[0].grfInheritance); + ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %lx\n", access2[0].grfInheritance); ok(EqualSid(access2[0].Trustee.ptstrName, everyone_sid), "Expected equal SIDs\n"); LocalFree(access2); LocalFree(new_acl); @@ -7444,19 +7444,19 @@ static void test_GetExplicitEntriesFromAclW(void) access.Trustee.TrusteeForm = TRUSTEE_IS_NAME; access.Trustee.ptstrName = (LPWSTR)wszCurrentUser; res = pSetEntriesInAclW(1, &access, old_acl, &new_acl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(new_acl != NULL, "returned acl was NULL\n"); access2 = NULL; res = pGetExplicitEntriesFromAclW(new_acl, &count, &access2); - ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %d\n", GetLastError()); - ok(count == 2, "Expected count == 2, got %d\n", count); + ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %ld\n", GetLastError()); + ok(count == 2, "Expected count == 2, got %ld\n", count); ok(access2[0].grfAccessMode == GRANT_ACCESS, "Expected GRANT_ACCESS, got %d\n", access2[0].grfAccessMode); - ok(access2[0].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %d\n", access2[0].grfAccessPermissions); + ok(access2[0].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %ld\n", access2[0].grfAccessPermissions); ok(access2[0].Trustee.TrusteeType == TRUSTEE_IS_UNKNOWN, "Expected TRUSTEE_IS_UNKNOWN trustee type, got %d\n", access2[0].Trustee.TrusteeType); ok(access2[0].Trustee.TrusteeForm == TRUSTEE_IS_SID, "Expected SID trustee, got %d\n", access2[0].Trustee.TrusteeForm); - ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %x\n", access2[0].grfInheritance); + ok(access2[0].grfInheritance == NO_INHERITANCE, "Expected NO_INHERITANCE, got %lx\n", access2[0].grfInheritance); LocalFree(access2); LocalFree(new_acl); @@ -7464,39 +7464,39 @@ static void test_GetExplicitEntriesFromAclW(void) access.Trustee.TrusteeForm = TRUSTEE_IS_SID; access.Trustee.ptstrName = users_sid; res = pSetEntriesInAclW(1, &access, old_acl, &new_acl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(new_acl != NULL, "returned acl was NULL\n"); access2 = (void *)0xdeadbeef; res = pGetExplicitEntriesFromAclW(new_acl, &count, &access2); - ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %d\n", GetLastError()); - ok(count == 0, "Expected count == 0, got %d\n", count); + ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %ld\n", GetLastError()); + ok(count == 0, "Expected count == 0, got %ld\n", count); ok(access2 == NULL, "access2 was not NULL\n"); LocalFree(new_acl); /* Make the ACL both Allow and Deny Everyone. */ res = AddAccessAllowedAce(old_acl, ACL_REVISION, KEY_READ, everyone_sid); - ok(res, "AddAccessAllowedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessAllowedAce failed with error %ld\n", GetLastError()); res = AddAccessDeniedAce(old_acl, ACL_REVISION, KEY_WRITE, everyone_sid); - ok(res, "AddAccessDeniedAce failed with error %d\n", GetLastError()); + ok(res, "AddAccessDeniedAce failed with error %ld\n", GetLastError()); /* Revoke Everyone. */ access.Trustee.ptstrName = everyone_sid; access.Trustee.TrusteeType = TRUSTEE_IS_WELL_KNOWN_GROUP; access.grfAccessPermissions = 0; new_acl = NULL; res = pSetEntriesInAclW(1, &access, old_acl, &new_acl); - ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %u\n", res); + ok(res == ERROR_SUCCESS, "SetEntriesInAclW failed: %lu\n", res); ok(new_acl != NULL, "returned acl was NULL\n"); /* Deny Everyone should remain (along with Grant Users from earlier). */ access2 = NULL; res = pGetExplicitEntriesFromAclW(new_acl, &count, &access2); - ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %d\n", GetLastError()); - ok(count == 2, "Expected count == 2, got %d\n", count); + ok(res == ERROR_SUCCESS, "GetExplicitEntriesFromAclW failed with error %ld\n", GetLastError()); + ok(count == 2, "Expected count == 2, got %ld\n", count); ok(access2[0].grfAccessMode == GRANT_ACCESS, "Expected GRANT_ACCESS, got %d\n", access2[0].grfAccessMode); - ok(access2[0].grfAccessPermissions == KEY_READ , "Expected KEY_READ, got %d\n", access2[0].grfAccessPermissions); + ok(access2[0].grfAccessPermissions == KEY_READ , "Expected KEY_READ, got %ld\n", access2[0].grfAccessPermissions); ok(EqualSid(access2[0].Trustee.ptstrName, users_sid), "Expected equal SIDs\n"); ok(access2[1].grfAccessMode == DENY_ACCESS, "Expected DENY_ACCESS, got %d\n", access2[1].grfAccessMode); - ok(access2[1].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %d\n", access2[1].grfAccessPermissions); + ok(access2[1].grfAccessPermissions == KEY_WRITE, "Expected KEY_WRITE, got %ld\n", access2[1].grfAccessPermissions); ok(EqualSid(access2[1].Trustee.ptstrName, everyone_sid), "Expected equal SIDs\n"); LocalFree(access2); @@ -7519,24 +7519,24 @@ static void test_BuildSecurityDescriptorW(void) buf_size = sizeof(buf); rel_sd = (SECURITY_DESCRIPTOR *)buf; success = MakeSelfRelativeSD(&old_sd, rel_sd, &buf_size); - ok(success, "MakeSelfRelativeSD failed with %u\n", GetLastError()); + ok(success, "MakeSelfRelativeSD failed with %lu\n", GetLastError()); new_sd = NULL; new_sd_size = 0; ret = BuildSecurityDescriptorW(NULL, NULL, 0, NULL, 0, NULL, NULL, &new_sd_size, (void **)&new_sd); - ok(ret == ERROR_SUCCESS, "BuildSecurityDescriptor failed with %u\n", ret); + ok(ret == ERROR_SUCCESS, "BuildSecurityDescriptor failed with %lu\n", ret); ok(new_sd != NULL, "expected new_sd != NULL\n"); LocalFree(new_sd); new_sd = (void *)0xdeadbeef; ret = BuildSecurityDescriptorW(NULL, NULL, 0, NULL, 0, NULL, &old_sd, &new_sd_size, (void **)&new_sd); - ok(ret == ERROR_INVALID_SECURITY_DESCR, "expected ERROR_INVALID_SECURITY_DESCR, got %u\n", ret); + ok(ret == ERROR_INVALID_SECURITY_DESCR, "expected ERROR_INVALID_SECURITY_DESCR, got %lu\n", ret); ok(new_sd == (void *)0xdeadbeef, "expected new_sd == 0xdeadbeef, got %p\n", new_sd); new_sd = NULL; new_sd_size = 0; ret = BuildSecurityDescriptorW(NULL, NULL, 0, NULL, 0, NULL, rel_sd, &new_sd_size, (void **)&new_sd); - ok(ret == ERROR_SUCCESS, "BuildSecurityDescriptor failed with %u\n", ret); + ok(ret == ERROR_SUCCESS, "BuildSecurityDescriptor failed with %lu\n", ret); ok(new_sd != NULL, "expected new_sd != NULL\n"); LocalFree(new_sd); } @@ -7557,17 +7557,17 @@ static void test_EqualDomainSid(void) } ret = AllocateAndInitializeSid(&ident, 6, SECURITY_NT_NON_UNIQUE, 12, 23, 34, 45, 56, 0, 0, &domainsid); - ok(ret, "AllocateAndInitializeSid error %u\n", GetLastError()); + ok(ret, "AllocateAndInitializeSid error %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = pEqualDomainSid(NULL, NULL, NULL); ok(!ret, "got %d\n", ret); - ok(GetLastError() == ERROR_INVALID_SID, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_SID, "got %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = pEqualDomainSid(domainsid, domainsid, NULL); ok(!ret, "got %d\n", ret); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError()); for (i = 0; i < ARRAY_SIZE(well_known_sid_values); i++) { @@ -7586,24 +7586,24 @@ static void test_EqualDomainSid(void) if (pisid->SubAuthority[0] != SECURITY_BUILTIN_DOMAIN_RID) { ok(!ret, "%u: got %d\n", i, ret); - ok(GetLastError() == ERROR_NON_DOMAIN_SID, "%u: got %u\n", i, GetLastError()); + ok(GetLastError() == ERROR_NON_DOMAIN_SID, "%u: got %lu\n", i, GetLastError()); ok(equal == 0xdeadbeef, "%u: got %d\n", i, equal); continue; } ok(ret, "%u: got %d\n", i, ret); - ok(GetLastError() == 0, "%u: got %u\n", i, GetLastError()); + ok(GetLastError() == 0, "%u: got %lu\n", i, GetLastError()); ok(equal == 0, "%u: got %d\n", i, equal); size = sizeof(sid_buffer2); ret = CreateWellKnownSid(i, well_known_sid_values[i].without_domain ? NULL : domainsid, sid2, &size); - ok(ret, "%u: CreateWellKnownSid error %u\n", i, GetLastError()); + ok(ret, "%u: CreateWellKnownSid error %lu\n", i, GetLastError()); equal = 0xdeadbeef; SetLastError(0xdeadbeef); ret = pEqualDomainSid(sid, sid2, &equal); ok(ret, "%u: got %d\n", i, ret); - ok(GetLastError() == 0, "%u: got %u\n", i, GetLastError()); + ok(GetLastError() == 0, "%u: got %lu\n", i, GetLastError()); ok(equal == 1, "%u: got %d\n", i, equal); } @@ -7616,16 +7616,16 @@ static DWORD WINAPI duplicate_handle_access_thread(void *arg) BOOL ret; event2 = OpenEventA(SYNCHRONIZE, FALSE, "test_dup"); - ok(!!event2, "got error %u\n", GetLastError()); + ok(!!event2, "got error %lu\n", GetLastError()); CloseHandle(event2); event2 = OpenEventA(EVENT_MODIFY_STATE, FALSE, "test_dup"); - ok(!!event2, "got error %u\n", GetLastError()); + ok(!!event2, "got error %lu\n", GetLastError()); CloseHandle(event2); ret = DuplicateHandle(GetCurrentProcess(), event, GetCurrentProcess(), &event2, EVENT_MODIFY_STATE, FALSE, 0); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); CloseHandle(event2); return 0; @@ -7652,95 +7652,95 @@ static void test_duplicate_handle_access(void) */ ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE | TOKEN_QUERY | TOKEN_ASSIGN_PRIMARY, &token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); size = sizeof(everyone_sid_buffer); ret = CreateWellKnownSid(WinWorldSid, NULL, everyone_sid, &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); size = sizeof(local_sid_buffer); ret = CreateWellKnownSid(WinLocalSid, NULL, local_sid, &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); InitializeAcl(acl, sizeof(acl_buffer), ACL_REVISION); ret = AddAccessAllowedAce(acl, ACL_REVISION, SYNCHRONIZE, everyone_sid); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION); ret = AddAccessAllowedAce(acl, ACL_REVISION, EVENT_MODIFY_STATE, local_sid); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION); ret = SetSecurityDescriptorDacl(&sd, TRUE, acl, FALSE); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); sa.lpSecurityDescriptor = &sd; sid_attr.Sid = local_sid; sid_attr.Attributes = 0; ret = CreateRestrictedToken(token, 0, 1, &sid_attr, 0, NULL, 0, NULL, &restricted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = DuplicateTokenEx(restricted, TOKEN_IMPERSONATE, NULL, SecurityImpersonation, TokenImpersonation, &impersonation); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); all_event = CreateEventA(&sa, TRUE, TRUE, "test_dup"); - ok(!!all_event, "got error %u\n", GetLastError()); + ok(!!all_event, "got error %lu\n", GetLastError()); sync_event = OpenEventA(SYNCHRONIZE, FALSE, "test_dup"); - ok(!!sync_event, "got error %u\n", GetLastError()); + ok(!!sync_event, "got error %lu\n", GetLastError()); event2 = OpenEventA(SYNCHRONIZE, FALSE, "test_dup"); - ok(!!event2, "got error %u\n", GetLastError()); + ok(!!event2, "got error %lu\n", GetLastError()); CloseHandle(event2); event2 = OpenEventA(EVENT_MODIFY_STATE, FALSE, "test_dup"); - ok(!!event2, "got error %u\n", GetLastError()); + ok(!!event2, "got error %lu\n", GetLastError()); CloseHandle(event2); ret = DuplicateHandle(GetCurrentProcess(), all_event, GetCurrentProcess(), &event2, EVENT_MODIFY_STATE, FALSE, 0); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); CloseHandle(event2); ret = DuplicateHandle(GetCurrentProcess(), sync_event, GetCurrentProcess(), &event2, EVENT_MODIFY_STATE, FALSE, 0); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); CloseHandle(event2); ret = SetThreadToken(NULL, impersonation); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); thread = CreateThread(NULL, 0, duplicate_handle_access_thread, sync_event, 0, NULL); ret = WaitForSingleObject(thread, 1000); ok(!ret, "wait failed\n"); event2 = OpenEventA(SYNCHRONIZE, FALSE, "test_dup"); - ok(!!event2, "got error %u\n", GetLastError()); + ok(!!event2, "got error %lu\n", GetLastError()); CloseHandle(event2); SetLastError(0xdeadbeef); event2 = OpenEventA(EVENT_MODIFY_STATE, FALSE, "test_dup"); ok(!event2, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); ret = DuplicateHandle(GetCurrentProcess(), all_event, GetCurrentProcess(), &event2, EVENT_MODIFY_STATE, FALSE, 0); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); CloseHandle(event2); SetLastError(0xdeadbeef); ret = DuplicateHandle(GetCurrentProcess(), sync_event, GetCurrentProcess(), &event2, EVENT_MODIFY_STATE, FALSE, 0); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); ret = RevertToSelf(); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); - sprintf(cmdline, "%s security duplicate %Iu %u %Iu", myARGV[0], + sprintf(cmdline, "%s security duplicate %Iu %lu %Iu", myARGV[0], (ULONG_PTR)sync_event, GetCurrentProcessId(), (ULONG_PTR)impersonation ); ret = CreateProcessAsUserA(restricted, NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = DuplicateHandle(GetCurrentProcess(), all_event, pi.hProcess, &event2, EVENT_MODIFY_STATE, FALSE, 0); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = DuplicateHandle(GetCurrentProcess(), sync_event, pi.hProcess, &event2, EVENT_MODIFY_STATE, FALSE, 0); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); ret = WaitForSingleObject(pi.hProcess, 1000); ok(!ret, "wait failed\n"); @@ -7759,43 +7759,43 @@ static void test_duplicate_handle_access_child(void) event = (HANDLE)(ULONG_PTR)_atoi64(myARGV[3]); process = OpenProcess(PROCESS_DUP_HANDLE, FALSE, atoi(myARGV[4])); - ok(!!process, "failed to open process, error %u\n", GetLastError()); + ok(!!process, "failed to open process, error %lu\n", GetLastError()); event2 = OpenEventA(SYNCHRONIZE, FALSE, "test_dup"); - ok(!!event2, "got error %u\n", GetLastError()); + ok(!!event2, "got error %lu\n", GetLastError()); CloseHandle(event2); SetLastError(0xdeadbeef); event2 = OpenEventA(EVENT_MODIFY_STATE, FALSE, "test_dup"); ok(!event2, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); ret = DuplicateHandle(process, event, process, &event2, EVENT_MODIFY_STATE, FALSE, 0); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = DuplicateHandle(process, event, GetCurrentProcess(), &event2, EVENT_MODIFY_STATE, FALSE, 0); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); ret = DuplicateHandle(process, (HANDLE)(ULONG_PTR)_atoi64(myARGV[5]), GetCurrentProcess(), &token, 0, FALSE, DUPLICATE_SAME_ACCESS); - ok(ret, "failed to retrieve token, error %u\n", GetLastError()); + ok(ret, "failed to retrieve token, error %lu\n", GetLastError()); ret = SetThreadToken(NULL, token); - ok(ret, "failed to set thread token, error %u\n", GetLastError()); + ok(ret, "failed to set thread token, error %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = DuplicateHandle(process, event, process, &event2, EVENT_MODIFY_STATE, FALSE, 0); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = DuplicateHandle(process, event, GetCurrentProcess(), &event2, EVENT_MODIFY_STATE, FALSE, 0); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); ret = RevertToSelf(); - ok(ret, "failed to revert, error %u\n", GetLastError()); + ok(ret, "failed to revert, error %lu\n", GetLastError()); CloseHandle(token); CloseHandle(process); } @@ -7825,58 +7825,58 @@ static void test_create_process_token(void) size = sizeof(sid_buffer); ret = CreateWellKnownSid(WinLocalSid, NULL, sid, &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = InitializeAcl(acl, sizeof(acl_buffer), ACL_REVISION); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = AddAccessAllowedAce(acl, ACL_REVISION, EVENT_MODIFY_STATE, sid); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION); ret = SetSecurityDescriptorDacl(&sd, TRUE, acl, FALSE); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); sa.lpSecurityDescriptor = &sd; event = CreateEventA(&sa, TRUE, TRUE, "test_event"); - ok(!!event, "got error %u\n", GetLastError()); + ok(!!event, "got error %lu\n", GetLastError()); sprintf(cmdline, "%s security restricted 0", myARGV[0]); ret = CreateProcessAsUserA(NULL, NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); join_process(&pi); ret = CreateProcessAsUserA(GetCurrentProcessToken(), NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); todo_wine ok(!ret, "expected failure\n"); - todo_wine ok(GetLastError() == ERROR_INVALID_HANDLE, "got error %u\n", GetLastError()); + todo_wine ok(GetLastError() == ERROR_INVALID_HANDLE, "got error %lu\n", GetLastError()); if (ret) join_process(&pi); ret = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_ASSIGN_PRIMARY, &token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = CreateProcessAsUserA(token, NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); - ok(ret || broken(GetLastError() == ERROR_ACCESS_DENIED) /* < 7 */, "got error %u\n", GetLastError()); + ok(ret || broken(GetLastError() == ERROR_ACCESS_DENIED) /* < 7 */, "got error %lu\n", GetLastError()); if (ret) join_process(&pi); CloseHandle(token); ret = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = CreateProcessAsUserA(token, NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); CloseHandle(token); ret = OpenProcessToken(GetCurrentProcess(), TOKEN_ASSIGN_PRIMARY, &token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = CreateProcessAsUserA(token, NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); CloseHandle(token); ret = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_ASSIGN_PRIMARY | TOKEN_DUPLICATE, &token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = DuplicateTokenEx(token, TOKEN_QUERY | TOKEN_ASSIGN_PRIMARY, NULL, SecurityImpersonation, TokenImpersonation, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = CreateProcessAsUserA(token2, NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); - ok(ret || broken(GetLastError() == ERROR_BAD_TOKEN_TYPE) /* < 7 */, "got error %u\n", GetLastError()); + ok(ret || broken(GetLastError() == ERROR_BAD_TOKEN_TYPE) /* < 7 */, "got error %lu\n", GetLastError()); if (ret) join_process(&pi); CloseHandle(token2); @@ -7884,9 +7884,9 @@ static void test_create_process_token(void) sid_attr.Sid = sid; sid_attr.Attributes = 0; ret = CreateRestrictedToken(token, 0, 1, &sid_attr, 0, NULL, 0, NULL, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = CreateProcessAsUserA(token2, NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); join_process(&pi); CloseHandle(token2); @@ -7903,13 +7903,13 @@ static void test_create_process_token_child(void) event = OpenEventA(EVENT_MODIFY_STATE, FALSE, "test_event"); if (!atoi(myARGV[3])) { - ok(!!event, "got error %u\n", GetLastError()); + ok(!!event, "got error %lu\n", GetLastError()); CloseHandle(event); } else { ok(!event, "expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "got error %lu\n", GetLastError()); } } @@ -7933,17 +7933,17 @@ static void test_pseudo_handle_security(void) }; ret = GetKernelObjectSecurity(GetCurrentProcess(), OWNER_SECURITY_INFORMATION, &sd, sizeof(buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(GetCurrentThread(), OWNER_SECURITY_INFORMATION, &sd, sizeof(buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); for (i = 0; i < ARRAY_SIZE(keys); ++i) { SetLastError(0xdeadbeef); ret = GetKernelObjectSecurity(keys[i], OWNER_SECURITY_INFORMATION, &sd, sizeof(buffer), &size); ok(!ret, "key %p: expected failure\n", keys[i]); - ok(GetLastError() == ERROR_INVALID_HANDLE, "key %p: got error %u\n", keys[i], GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "key %p: got error %lu\n", keys[i], GetLastError()); ret = GetSecurityInfo(keys[i], SE_REGISTRY_KEY, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, &sd_ptr); @@ -7968,25 +7968,25 @@ static void test_duplicate_token(void) BOOL ret; ret = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_DUPLICATE | TOKEN_ADJUST_DEFAULT, &token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = DuplicateToken(token, SecurityAnonymous, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); TEST_GRANTED_ACCESS(token2, TOKEN_QUERY | TOKEN_IMPERSONATE); CloseHandle(token2); ret = DuplicateTokenEx(token, 0, NULL, SecurityAnonymous, TokenPrimary, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); TEST_GRANTED_ACCESS(token2, TOKEN_QUERY | TOKEN_DUPLICATE | TOKEN_ADJUST_DEFAULT); CloseHandle(token2); ret = DuplicateTokenEx(token, MAXIMUM_ALLOWED, NULL, SecurityAnonymous, TokenPrimary, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); TEST_GRANTED_ACCESS(token2, TOKEN_ALL_ACCESS); CloseHandle(token2); ret = DuplicateTokenEx(token, TOKEN_QUERY_SOURCE, NULL, SecurityAnonymous, TokenPrimary, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); TEST_GRANTED_ACCESS(token2, TOKEN_QUERY_SOURCE); CloseHandle(token2); @@ -8008,19 +8008,19 @@ static void test_GetKernelObjectSecurity(void) size = 0xdeadbeef; ret = GetKernelObjectSecurity(NULL, OWNER_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "got error %u\n", GetLastError()); - ok(size == 0xdeadbeef, "got size %u\n", size); + ok(GetLastError() == ERROR_INVALID_HANDLE, "got error %lu\n", GetLastError()); + ok(size == 0xdeadbeef, "got size %lu\n", size); SetLastError(0xdeadbeef); ret = GetKernelObjectSecurity(GetCurrentProcess(), OWNER_SECURITY_INFORMATION, NULL, 0, NULL); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_NOACCESS, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_NOACCESS, "got error %lu\n", GetLastError()); SetLastError(0xdeadbeef); size = 0xdeadbeef; ret = GetKernelObjectSecurity(GetCurrentProcess(), OWNER_SECURITY_INFORMATION, NULL, 0, &size); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got error %lu\n", GetLastError()); ok(size > 0 && size != 0xdeadbeef, "got size 0\n"); sd = malloc(size + 1); @@ -8028,14 +8028,14 @@ static void test_GetKernelObjectSecurity(void) SetLastError(0xdeadbeef); ret = GetKernelObjectSecurity(GetCurrentProcess(), OWNER_SECURITY_INFORMATION, sd, size - 1, &ret_size); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got error %u\n", GetLastError()); - ok(ret_size == size, "expected size %u, got %u\n", size, ret_size); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got error %lu\n", GetLastError()); + ok(ret_size == size, "expected size %lu, got %lu\n", size, ret_size); SetLastError(0xdeadbeef); ret = GetKernelObjectSecurity(GetCurrentProcess(), OWNER_SECURITY_INFORMATION, sd, size + 1, &ret_size); ok(ret, "expected success\n"); - ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError()); - ok(ret_size == size, "expected size %u, got %u\n", size, ret_size); + ok(GetLastError() == 0xdeadbeef, "got error %lu\n", GetLastError()); + ok(ret_size == size, "expected size %lu, got %lu\n", size, ret_size); free(sd); @@ -8045,37 +8045,37 @@ static void test_GetKernelObjectSecurity(void) SetLastError(0xdeadbeef); ret = GetKernelObjectSecurity(GetCurrentProcess(), 0x100000, NULL, 0, &size); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got error %lu\n", GetLastError()); sd = malloc(size); SetLastError(0xdeadbeef); ret = GetKernelObjectSecurity(GetCurrentProcess(), 0x100000, sd, size, &ret_size); ok(ret, "expected success\n"); - ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError()); - ok(ret_size == size, "expected size %u, got %u\n", size, ret_size); + ok(GetLastError() == 0xdeadbeef, "got error %lu\n", GetLastError()); + ok(ret_size == size, "expected size %lu, got %lu\n", size, ret_size); ret = GetSecurityDescriptorControl(sd, &control, &revision); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); todo_wine ok(control == SE_SELF_RELATIVE, "got control %#x\n", control); - ok(revision == SECURITY_DESCRIPTOR_REVISION1, "got revision %u\n", revision); + ok(revision == SECURITY_DESCRIPTOR_REVISION1, "got revision %lu\n", revision); ret = GetSecurityDescriptorOwner(sd, &sid, &defaulted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(!sid, "expected no owner SID\n"); ok(!defaulted, "expected owner not defaulted\n"); ret = GetSecurityDescriptorGroup(sd, &sid, &defaulted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(!sid, "expected no group SID\n"); ok(!defaulted, "expected group not defaulted\n"); ret = GetSecurityDescriptorDacl(sd, &present, &acl, &defaulted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); todo_wine ok(!present, "expected no DACL present\n"); /* the descriptor is defaulted only on Windows >= 7 */ ret = GetSecurityDescriptorSacl(sd, &present, &acl, &defaulted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(!present, "expected no SACL present\n"); /* the descriptor is defaulted only on Windows >= 7 */ @@ -8089,9 +8089,9 @@ static void check_different_token(HANDLE token1, HANDLE token2) BOOL ret; ret = GetTokenInformation(token1, TokenStatistics, &stats1, sizeof(stats1), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(token2, TokenStatistics, &stats2, sizeof(stats2), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(memcmp(&stats1.TokenId, &stats2.TokenId, sizeof(LUID)), "expected different IDs\n"); } @@ -8106,13 +8106,13 @@ static void test_elevation(void) ret = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | READ_CONTROL | TOKEN_DUPLICATE | TOKEN_ASSIGN_PRIMARY | TOKEN_ADJUST_PRIVILEGES | TOKEN_ADJUST_DEFAULT, &token); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(token, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); orig_type = type; ret = GetTokenInformation(token, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(token, TokenLinkedToken, &linked, sizeof(linked), &size); if (!ret && GetLastError() == ERROR_NO_SUCH_LOGON_SESSION) /* fails on w2008s64 */ { @@ -8120,42 +8120,42 @@ static void test_elevation(void) CloseHandle(token); return; } - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); if (type == TokenElevationTypeDefault) { - ok(elevation.TokenIsElevated == FALSE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(elevation.TokenIsElevated == FALSE, "got elevation %#lx\n", elevation.TokenIsElevated); ok(!linked.LinkedToken, "expected no linked token\n"); } else if (type == TokenElevationTypeLimited) { - ok(elevation.TokenIsElevated == FALSE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(elevation.TokenIsElevated == FALSE, "got elevation %#lx\n", elevation.TokenIsElevated); ok(!!linked.LinkedToken, "expected a linked token\n"); TEST_GRANTED_ACCESS(linked.LinkedToken, TOKEN_ALL_ACCESS); ret = GetTokenInformation(linked.LinkedToken, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenElevationTypeFull, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenElevationTypeFull, "got type %#lx\n", type); ret = GetTokenInformation(linked.LinkedToken, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == TRUE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == TRUE, "got elevation %#lx\n", elevation.TokenIsElevated); ret = GetTokenInformation(linked.LinkedToken, TokenType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenImpersonation, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenImpersonation, "got type %#lx\n", type); ret = GetTokenInformation(linked.LinkedToken, TokenImpersonationLevel, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == SecurityIdentification, "got impersonation level %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == SecurityIdentification, "got impersonation level %#lx\n", type); /* Asking for the linked token again gives us a different token. */ ret = GetTokenInformation(token, TokenLinkedToken, &linked2, sizeof(linked2), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(linked2.LinkedToken, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenElevationTypeFull, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenElevationTypeFull, "got type %#lx\n", type); ret = GetTokenInformation(linked2.LinkedToken, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == TRUE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == TRUE, "got elevation %#lx\n", elevation.TokenIsElevated); check_different_token(linked.LinkedToken, linked2.LinkedToken); @@ -8163,14 +8163,14 @@ static void test_elevation(void) /* Asking for the linked token's linked token gives us a new limited token. */ ret = GetTokenInformation(linked.LinkedToken, TokenLinkedToken, &linked2, sizeof(linked2), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(linked2.LinkedToken, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenElevationTypeLimited, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenElevationTypeLimited, "got type %#lx\n", type); ret = GetTokenInformation(linked2.LinkedToken, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == FALSE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == FALSE, "got elevation %#lx\n", elevation.TokenIsElevated); check_different_token(token, linked2.LinkedToken); @@ -8181,42 +8181,42 @@ static void test_elevation(void) type = TokenElevationTypeLimited; ret = SetTokenInformation(token, TokenElevationType, &type, sizeof(type)); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %lu\n", GetLastError()); elevation.TokenIsElevated = FALSE; ret = SetTokenInformation(token, TokenElevation, &elevation, sizeof(elevation)); ok(!ret, "expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %u\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %lu\n", GetLastError()); } else { - ok(elevation.TokenIsElevated == TRUE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(elevation.TokenIsElevated == TRUE, "got elevation %#lx\n", elevation.TokenIsElevated); ok(!!linked.LinkedToken, "expected a linked token\n"); TEST_GRANTED_ACCESS(linked.LinkedToken, TOKEN_ALL_ACCESS); ret = GetTokenInformation(linked.LinkedToken, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenElevationTypeLimited, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenElevationTypeLimited, "got type %#lx\n", type); ret = GetTokenInformation(linked.LinkedToken, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == FALSE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == FALSE, "got elevation %#lx\n", elevation.TokenIsElevated); ret = GetTokenInformation(linked.LinkedToken, TokenType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenImpersonation, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenImpersonation, "got type %#lx\n", type); ret = GetTokenInformation(linked.LinkedToken, TokenImpersonationLevel, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == SecurityIdentification, "got impersonation level %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == SecurityIdentification, "got impersonation level %#lx\n", type); /* Asking for the linked token again gives us a different token. */ ret = GetTokenInformation(token, TokenLinkedToken, &linked2, sizeof(linked2), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(linked2.LinkedToken, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenElevationTypeLimited, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenElevationTypeLimited, "got type %#lx\n", type); ret = GetTokenInformation(linked2.LinkedToken, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == FALSE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == FALSE, "got elevation %#lx\n", elevation.TokenIsElevated); check_different_token(linked.LinkedToken, linked2.LinkedToken); @@ -8224,14 +8224,14 @@ static void test_elevation(void) /* Asking for the linked token's linked token gives us a new elevated token. */ ret = GetTokenInformation(linked.LinkedToken, TokenLinkedToken, &linked2, sizeof(linked2), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(linked2.LinkedToken, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenElevationTypeFull, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenElevationTypeFull, "got type %#lx\n", type); ret = GetTokenInformation(linked2.LinkedToken, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == TRUE, "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == TRUE, "got elevation %#lx\n", elevation.TokenIsElevated); check_different_token(token, linked2.LinkedToken); @@ -8242,33 +8242,33 @@ static void test_elevation(void) type = TokenElevationTypeLimited; ret = SetTokenInformation(token, TokenElevationType, &type, sizeof(type)); ok(!ret, "expected failure\n"); - todo_wine ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %u\n", GetLastError()); + todo_wine ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %lu\n", GetLastError()); elevation.TokenIsElevated = FALSE; ret = SetTokenInformation(token, TokenElevation, &elevation, sizeof(elevation)); ok(!ret, "expected failure\n"); - todo_wine ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %u\n", GetLastError()); + todo_wine ok(GetLastError() == ERROR_INVALID_PARAMETER, "got error %lu\n", GetLastError()); } ret = DuplicateTokenEx(token, TOKEN_ALL_ACCESS, NULL, SecurityAnonymous, TokenPrimary, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(token2, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(type == orig_type, "expected same type\n"); ret = GetTokenInformation(token2, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == (type == TokenElevationTypeFull), "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == (type == TokenElevationTypeFull), "got elevation %#lx\n", elevation.TokenIsElevated); ret = GetTokenInformation(token2, TokenLinkedToken, &linked, sizeof(linked), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); if (type == TokenElevationTypeDefault) { ok(!linked.LinkedToken, "expected no linked token\n"); ret = GetTokenInformation(linked.LinkedToken, TokenType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == TokenImpersonation, "got type %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == TokenImpersonation, "got type %#lx\n", type); ret = GetTokenInformation(linked.LinkedToken, TokenImpersonationLevel, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(type == SecurityIdentification, "got impersonation level %#x\n", type); + ok(ret, "got error %lu\n", GetLastError()); + ok(type == SecurityIdentification, "got impersonation level %#lx\n", type); CloseHandle(linked.LinkedToken); } else @@ -8276,15 +8276,15 @@ static void test_elevation(void) CloseHandle(token2); ret = CreateRestrictedToken(token, 0, 0, NULL, 0, NULL, 0, NULL, &token2); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(token2, TokenElevationType, &type, sizeof(type), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(type == orig_type, "expected same type\n"); ret = GetTokenInformation(token2, TokenElevation, &elevation, sizeof(elevation), &size); - ok(ret, "got error %u\n", GetLastError()); - ok(elevation.TokenIsElevated == (type == TokenElevationTypeFull), "got elevation %#x\n", elevation.TokenIsElevated); + ok(ret, "got error %lu\n", GetLastError()); + ok(elevation.TokenIsElevated == (type == TokenElevationTypeFull), "got elevation %#lx\n", elevation.TokenIsElevated); ret = GetTokenInformation(token2, TokenLinkedToken, &linked, sizeof(linked), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); if (type == TokenElevationTypeDefault) ok(!linked.LinkedToken, "expected no linked token\n"); else @@ -8308,56 +8308,56 @@ static void test_elevation(void) privs.PrivilegeCount = 1; ret = LookupPrivilegeValueA(NULL, "SeChangeNotifyPrivilege", &privs.Privileges[0].Luid); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); privs.Privileges[0].Attributes = SE_PRIVILEGE_REMOVED; ret = AdjustTokenPrivileges(token, FALSE, &privs, sizeof(prev_privs_buffer), prev_privs, &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); priv_set.PrivilegeCount = 1; priv_set.Control = 0; priv_set.Privilege[0] = privs.Privileges[0]; ret = PrivilegeCheck(token, &priv_set, &is_member); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(!is_member, "not a member\n"); ret = GetTokenInformation(token, TokenLinkedToken, &linked, sizeof(linked), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = PrivilegeCheck(linked.LinkedToken, &priv_set, &is_member); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(is_member, "not a member\n"); CloseHandle(linked.LinkedToken); ret = AdjustTokenPrivileges(token, FALSE, prev_privs, 0, NULL, NULL); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); /* Linked tokens do not preserve default DACL modifications. */ ret = GetTokenInformation(token, TokenDefaultDacl, prev_acl, sizeof(prev_acl_buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(prev_acl->DefaultDacl->AceCount, "expected non-empty default DACL\n"); InitializeAcl(&acl, sizeof(acl), ACL_REVISION); default_acl.DefaultDacl = &acl; ret = SetTokenInformation(token, TokenDefaultDacl, &default_acl, sizeof(default_acl)); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(token, TokenDefaultDacl, ret_acl, sizeof(acl_buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(!ret_acl->DefaultDacl->AceCount, "expected empty default DACL\n"); ret = GetTokenInformation(token, TokenLinkedToken, &linked, sizeof(linked), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetTokenInformation(linked.LinkedToken, TokenDefaultDacl, ret_acl, sizeof(acl_buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ok(ret_acl->DefaultDacl->AceCount, "expected non-empty default DACL\n"); CloseHandle(linked.LinkedToken); ret = SetTokenInformation(token, TokenDefaultDacl, prev_acl, sizeof(*prev_acl)); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); } CloseHandle(token); @@ -8383,7 +8383,7 @@ static void test_group_as_file_owner(void) CreateWellKnownSid(WinBuiltinAdministratorsSid, NULL, admin_sid, &size); ret = CheckTokenMembership(NULL, admin_sid, &present); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); if (!present) { skip("user is not an administrator\n"); @@ -8394,41 +8394,41 @@ static void test_group_as_file_owner(void) sprintf(path, "%s\\testdir", temp_path); ret = CreateDirectoryA(path, NULL); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); file = CreateFileA(path, FILE_ALL_ACCESS, 0, NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0); - ok(file != INVALID_HANDLE_VALUE, "got error %u\n", GetLastError()); + ok(file != INVALID_HANDLE_VALUE, "got error %lu\n", GetLastError()); ret = GetKernelObjectSecurity(file, DACL_SECURITY_INFORMATION, sd_buffer, sizeof(sd_buffer), &size); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetSecurityDescriptorDacl(sd, &present, &dacl, &defaulted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); InitializeSecurityDescriptor(&new_sd, SECURITY_DESCRIPTOR_REVISION); ret = SetSecurityDescriptorOwner(&new_sd, admin_sid, FALSE); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = GetSecurityDescriptorDacl(sd, &present, &dacl, &defaulted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = SetSecurityDescriptorDacl(&new_sd, present, dacl, defaulted); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = SetKernelObjectSecurity(file, OWNER_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION, &new_sd); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); CloseHandle(file); sprintf(path, "%s\\testdir\\subdir", temp_path); ret = CreateDirectoryA(path, NULL); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); ret = RemoveDirectoryA(path); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); sprintf(path, "%s\\testdir", temp_path); ret = RemoveDirectoryA(path); - ok(ret, "got error %u\n", GetLastError()); + ok(ret, "got error %lu\n", GetLastError()); } START_TEST(security) diff --git a/dlls/advapi32/tests/service.c b/dlls/advapi32/tests/service.c index 21704048778..fbb18b048a0 100644 --- a/dlls/advapi32/tests/service.c +++ b/dlls/advapi32/tests/service.c @@ -77,21 +77,21 @@ static void test_open_scm(void) /* No access rights */ SetLastError(0xdeadbeef); scm_handle = OpenSCManagerA(NULL, NULL, 0); - ok(scm_handle != NULL, "Expected success, got error %u\n", GetLastError()); + ok(scm_handle != NULL, "Expected success, got error %lu\n", GetLastError()); CloseServiceHandle(scm_handle); /* Unknown database name */ SetLastError(0xdeadbeef); scm_handle = OpenSCManagerA(NULL, "DoesNotExist", SC_MANAGER_CONNECT); ok(!scm_handle, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_NAME, "Expected ERROR_INVALID_NAME, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_NAME, "Expected ERROR_INVALID_NAME, got %ld\n", GetLastError()); CloseServiceHandle(scm_handle); /* Just in case */ /* MSDN says only ServiceActive is allowed, or NULL */ SetLastError(0xdeadbeef); scm_handle = OpenSCManagerA(NULL, SERVICES_FAILED_DATABASEA, SC_MANAGER_CONNECT); ok(!scm_handle, "Expected failure\n"); - ok(GetLastError() == ERROR_DATABASE_DOES_NOT_EXIST, "Expected ERROR_DATABASE_DOES_NOT_EXIST, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_DATABASE_DOES_NOT_EXIST, "Expected ERROR_DATABASE_DOES_NOT_EXIST, got %ld\n", GetLastError()); CloseServiceHandle(scm_handle); /* Just in case */ /* Remote unknown host */ @@ -101,21 +101,21 @@ static void test_open_scm(void) { ok(!scm_handle, "Expected failure\n"); ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE || GetLastError() == RPC_S_INVALID_NET_ADDR /* w2k8 */, - "Expected RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR, got %d\n", GetLastError()); + "Expected RPC_S_SERVER_UNAVAILABLE or RPC_S_INVALID_NET_ADDR, got %ld\n", GetLastError()); } CloseServiceHandle(scm_handle); /* Just in case */ /* Proper call with an empty hostname */ scm_handle = OpenSCManagerA("", SERVICES_ACTIVE_DATABASEA, SC_MANAGER_CONNECT); - ok(scm_handle != NULL, "Expected success, got error %u\n", GetLastError()); + ok(scm_handle != NULL, "Expected success, got error %lu\n", GetLastError()); CloseServiceHandle(scm_handle); /* Again a correct one */ SetLastError(0xdeadbeef); scm_handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); ok(GetLastError() == ERROR_SUCCESS || broken(GetLastError() == ERROR_IO_PENDING) /* win2k */, - "Expected ERROR_SUCCESS, got %u\n", GetLastError()); - ok(scm_handle != NULL, "Expected success, got error %u\n", GetLastError()); + "Expected ERROR_SUCCESS, got %lu\n", GetLastError()); + ok(scm_handle != NULL, "Expected success, got error %lu\n", GetLastError()); CloseServiceHandle(scm_handle); } @@ -129,7 +129,7 @@ static void test_open_svc(void) SetLastError(0xdeadbeef); svc_handle = OpenServiceA(NULL, NULL, 0); ok(!svc_handle, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); /* TODO: Add some tests with invalid handles. These produce errors on Windows but crash on Wine */ @@ -140,7 +140,7 @@ static void test_open_svc(void) ok(!svc_handle, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, XP, W2K3, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); CloseServiceHandle(scm_handle); /* Nonexistent service */ @@ -148,7 +148,7 @@ static void test_open_svc(void) SetLastError(0xdeadbeef); svc_handle = OpenServiceA(scm_handle, "deadbeef", GENERIC_READ); ok(!svc_handle, "Expected failure\n"); - ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); CloseServiceHandle(scm_handle); /* Proper SCM handle but different access rights */ @@ -159,7 +159,7 @@ static void test_open_svc(void) skip("Not enough rights to get a handle to the service\n"); else { - ok(svc_handle != NULL, "Expected success, got error %u\n", GetLastError()); + ok(svc_handle != NULL, "Expected success, got error %lu\n", GetLastError()); CloseServiceHandle(svc_handle); } @@ -183,7 +183,7 @@ static void test_open_svc(void) SetLastError(0xdeadbeef); svc_handle = OpenServiceA(scm_handle, displayname, GENERIC_READ); ok(!svc_handle, "Expected failure\n"); - ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); /* Just in case */ CloseServiceHandle(svc_handle); @@ -216,7 +216,7 @@ static void test_create_delete_svc(void) SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(NULL, NULL, NULL, 0, 0, 0, 0, NULL, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); scm_handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); @@ -226,7 +226,7 @@ static void test_create_delete_svc(void) ok(!svc_handle1, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, W2K3, XP, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Now with a servicename */ SetLastError(0xdeadbeef); @@ -234,7 +234,7 @@ static void test_create_delete_svc(void) ok(!svc_handle1, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, W2K3, XP, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Or just a binary name */ SetLastError(0xdeadbeef); @@ -242,24 +242,24 @@ static void test_create_delete_svc(void) ok(!svc_handle1, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, W2K3, XP, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Both servicename and binary name (We only have connect rights) */ SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, 0, 0, 0, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); /* They can even be empty at this stage of parameter checking */ SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, empty, NULL, 0, 0, 0, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, 0, 0, 0, 0, empty, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_ACCESS_DENIED, "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_ACCESS_DENIED, "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); /* Open the Service Control Manager with minimal rights for creation * (Verified with 'SC_MANAGER_ALL_ACCESS &~ SC_MANAGER_CREATE_SERVICE') @@ -279,17 +279,17 @@ static void test_create_delete_svc(void) SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, empty, NULL, 0, 0, 0, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_NAME, "Expected ERROR_INVALID_NAME, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_NAME, "Expected ERROR_INVALID_NAME, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, 0, 0, 0, 0, empty, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, empty, NULL, 0, 0, 0, 0, empty, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_NAME, "Expected ERROR_INVALID_NAME, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_NAME, "Expected ERROR_INVALID_NAME, got %ld\n", GetLastError()); /* Valid call (as we will see later) except for the empty binary name (to proof it's indeed * an ERROR_INVALID_PARAMETER) @@ -298,7 +298,7 @@ static void test_create_delete_svc(void) svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, 0, SERVICE_WIN32_OWN_PROCESS, SERVICE_DISABLED, 0, empty, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Windows checks if the 'service type', 'access type' and the combination of them are valid, so let's test that */ @@ -309,14 +309,14 @@ static void test_create_delete_svc(void) svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, GENERIC_ALL, SERVICE_WIN32_OWN_PROCESS | SERVICE_WIN32_SHARE_PROCESS, SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Illegal (SERVICE_INTERACTIVE_PROCESS is only allowed with SERVICE_WIN32_OWN_PROCESS or SERVICE_WIN32_SHARE_PROCESS) */ SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, GENERIC_ALL, SERVICE_FILE_SYSTEM_DRIVER | SERVICE_INTERACTIVE_PROCESS, SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Illegal (this combination is only allowed when the LocalSystem account (ServiceStartName) is used) * Not having a correct account would have resulted in an ERROR_INVALID_SERVICE_ACCOUNT. @@ -326,7 +326,7 @@ static void test_create_delete_svc(void) SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, account, password); ok(!svc_handle1, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_PARAMETER || GetLastError() == ERROR_INVALID_SERVICE_ACCOUNT, - "Expected ERROR_INVALID_PARAMETER or ERROR_INVALID_SERVICE_ACCOUNT, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER or ERROR_INVALID_SERVICE_ACCOUNT, got %ld\n", GetLastError()); /* Illegal (start-type is not a mask and should only be one of the possibilities) * Remark : 'OR'-ing them could result in a valid possibility (but doesn't make sense as @@ -336,36 +336,36 @@ static void test_create_delete_svc(void) svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, GENERIC_ALL, SERVICE_WIN32_OWN_PROCESS, SERVICE_AUTO_START | SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Illegal (SERVICE_BOOT_START and SERVICE_SYSTEM_START are only allowed for driver services) */ SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, 0, SERVICE_WIN32_OWN_PROCESS, SERVICE_BOOT_START, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Test if ServiceType can be a combined one for drivers */ SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, 0, SERVICE_KERNEL_DRIVER | SERVICE_FILE_SYSTEM_DRIVER, SERVICE_BOOT_START, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle1, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Test duplicate service names */ svc_handle1 = CreateServiceA(scm_handle, "winetest_dupname", "winetest_display", DELETE, SERVICE_WIN32_OWN_PROCESS, SERVICE_AUTO_START, 0, pathname, NULL, NULL, NULL, NULL, NULL); - ok(!!svc_handle1, "Failed to create service, error %u\n", GetLastError()); + ok(!!svc_handle1, "Failed to create service, error %lu\n", GetLastError()); svc_handle2 = CreateServiceA(scm_handle, "winetest_dupname", NULL, 0, SERVICE_WIN32_OWN_PROCESS, SERVICE_AUTO_START, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle2, "Expected failure\n"); - ok(GetLastError() == ERROR_SERVICE_EXISTS, "Got wrong error %u\n", GetLastError()); + ok(GetLastError() == ERROR_SERVICE_EXISTS, "Got wrong error %lu\n", GetLastError()); svc_handle2 = CreateServiceA(scm_handle, "winetest_dupname2", "winetest_dupname", DELETE, SERVICE_WIN32_OWN_PROCESS, SERVICE_AUTO_START, 0, pathname, NULL, NULL, NULL, NULL, NULL); todo_wine ok(!svc_handle2, "Expected failure\n"); - todo_wine ok(GetLastError() == ERROR_DUPLICATE_SERVICE_NAME, "Got wrong error %u\n", GetLastError()); + todo_wine ok(GetLastError() == ERROR_DUPLICATE_SERVICE_NAME, "Got wrong error %lu\n", GetLastError()); if (svc_handle2) { DeleteService(svc_handle2); @@ -378,18 +378,18 @@ static void test_create_delete_svc(void) { size = sizeof(buffer); ret = GetServiceKeyNameA(scm_handle, "winetest_display", buffer, &size); - ok(ret, "Failed to get key name, error %u\n", GetLastError()); + ok(ret, "Failed to get key name, error %lu\n", GetLastError()); ok(!strcmp(buffer, "winetest_dupname"), "Got wrong name \"%s\"\n", buffer); ret = DeleteService(svc_handle2); - ok(ret, "Failed to delete service, error %u\n", GetLastError()); + ok(ret, "Failed to delete service, error %lu\n", GetLastError()); CloseServiceHandle(svc_handle2); } else - ok(GetLastError() == ERROR_DUPLICATE_SERVICE_NAME, "Got wrong error %u\n", GetLastError()); + ok(GetLastError() == ERROR_DUPLICATE_SERVICE_NAME, "Got wrong error %lu\n", GetLastError()); ret = DeleteService(svc_handle1); - ok(ret, "Failed to delete service, error %u\n", GetLastError()); + ok(ret, "Failed to delete service, error %lu\n", GetLastError()); CloseServiceHandle(svc_handle1); /* Windows doesn't care about the access rights for creation (which makes @@ -399,14 +399,14 @@ static void test_create_delete_svc(void) SetLastError(0xdeadbeef); svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, 0, SERVICE_WIN32_OWN_PROCESS | SERVICE_INTERACTIVE_PROCESS, SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); - ok(svc_handle1 != NULL, "Could not create the service : %d\n", GetLastError()); + ok(svc_handle1 != NULL, "Could not create the service : %ld\n", GetLastError()); /* DeleteService however must have proper rights */ SetLastError(0xdeadbeef); ret = DeleteService(svc_handle1); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_ACCESS_DENIED, - "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); /* Open the service with minimal rights for deletion. * (Verified with 'SERVICE_ALL_ACCESS &~ DELETE') @@ -417,11 +417,11 @@ static void test_create_delete_svc(void) /* Now that we have the proper rights, we should be able to delete */ SetLastError(0xdeadbeef); ret = DeleteService(svc_handle1); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); /* Service is marked for delete, but handle is still open. Try to open service again. */ svc_handle2 = OpenServiceA(scm_handle, servicename, GENERIC_READ); - ok(svc_handle2 != NULL, "got %p, error %u\n", svc_handle2, GetLastError()); + ok(svc_handle2 != NULL, "got %p, error %lu\n", svc_handle2, GetLastError()); CloseServiceHandle(svc_handle2); CloseServiceHandle(svc_handle1); @@ -432,7 +432,7 @@ static void test_create_delete_svc(void) ret = DeleteService(NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); } static void test_get_displayname(void) @@ -455,7 +455,7 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameA(NULL, NULL, NULL, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); scm_handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); @@ -464,7 +464,7 @@ static void test_get_displayname(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, XP, W2K3, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); displaysize = sizeof(displayname); @@ -472,7 +472,7 @@ static void test_get_displayname(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, XP, W2K3, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* Test for nonexistent service */ SetLastError(0xdeadbeef); @@ -480,22 +480,22 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameA(scm_handle, deadbeef, NULL, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = GetServiceDisplayNameA(scm_handle, deadbeef, NULL, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(displaysize == 1, "Service size expected 1, got %d\n", displaysize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(displaysize == 1, "Service size expected 1, got %ld\n", displaysize); displaysize = 15; strcpy(displayname, "ABC"); ret = GetServiceDisplayNameA(scm_handle, deadbeef, displayname, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(displaysize == 15, "Service size expected 15, got %d\n", displaysize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(displaysize == 15, "Service size expected 15, got %ld\n", displaysize); ok(displayname[0] == 0, "Service name not empty\n"); displaysize = 15; @@ -503,8 +503,8 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameW(scm_handle, deadbeefW, displaynameW, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - ok(displaysize == 15, "Service size expected 15, got %d\n", displaysize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + ok(displaysize == 15, "Service size expected 15, got %ld\n", displaysize); ok(displaynameW[0] == 0, "Service name not empty\n"); displaysize = 0; @@ -512,17 +512,17 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameA(scm_handle, deadbeef, displayname, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(displaysize == 1, "Service size expected 1, got %d\n", displaysize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(displaysize == 1, "Service size expected 1, got %ld\n", displaysize); ok(displayname[0] == 'A', "Service name changed\n"); displaysize = 0; lstrcpyW( displaynameW, abcW ); ret = GetServiceDisplayNameW(scm_handle, deadbeefW, displaynameW, &displaysize); ok(!ret, "Expected failure\n"); - ok(displaysize == 2, "Service size expected 2, got %d\n", displaysize); + ok(displaysize == 2, "Service size expected 2, got %ld\n", displaysize); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); ok(displaynameW[0] == 'A', "Service name changed\n"); displaysize = 1; @@ -530,17 +530,17 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameA(scm_handle, deadbeef, displayname, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(displaysize == 1, "Service size expected 1, got %d\n", displaysize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(displaysize == 1, "Service size expected 1, got %ld\n", displaysize); ok(displayname[0] == 0, "Service name not empty\n"); displaysize = 1; lstrcpyW( displaynameW, abcW ); ret = GetServiceDisplayNameW(scm_handle, deadbeefW, displaynameW, &displaysize); ok(!ret, "Expected failure\n"); - ok(displaysize == 2, "Service size expected 2, got %d\n", displaysize); + ok(displaysize == 2, "Service size expected 2, got %ld\n", displaysize); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); ok(displaynameW[0] == 'A', "Service name changed\n"); displaysize = 2; @@ -548,17 +548,17 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameA(scm_handle, deadbeef, displayname, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(displaysize == 2, "Service size expected 2, got %d\n", displaysize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(displaysize == 2, "Service size expected 2, got %ld\n", displaysize); ok(displayname[0] == 0, "Service name not empty\n"); displaysize = 2; lstrcpyW( displaynameW, abcW ); ret = GetServiceDisplayNameW(scm_handle, deadbeefW, displaynameW, &displaysize); ok(!ret, "Expected failure\n"); - ok(displaysize == 2, "Service size expected 2, got %d\n", displaysize); + ok(displaysize == 2, "Service size expected 2, got %ld\n", displaysize); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); ok(displaynameW[0] == 0, "Service name not empty\n"); /* Check if 'Spooler' exists */ @@ -577,15 +577,15 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameA(scm_handle, spooler, NULL, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); tempsize = displaysize; displaysize = 0; ret = GetServiceDisplayNameA(scm_handle, spooler, NULL, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(displaysize == tempsize, "Buffer size mismatch (%d vs %d)\n", tempsize, displaysize); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(displaysize == tempsize, "Buffer size mismatch (%ld vs %ld)\n", tempsize, displaysize); /* Buffer is too small */ SetLastError(0xdeadbeef); @@ -594,7 +594,7 @@ static void test_get_displayname(void) ok(!ret, "Expected failure\n"); ok(displaysize == tempsize, "Expected the needed buffersize\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* First try with a buffer that should be big enough to hold * the ANSI string (and terminating character). This succeeds on Windows @@ -603,21 +603,21 @@ static void test_get_displayname(void) SetLastError(0xdeadbeef); displaysize = (tempsize / 2) + 1; ret = GetServiceDisplayNameA(scm_handle, spooler, displayname, &displaysize); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(displaysize == ((tempsize / 2) + 1), "Expected no change for the needed buffer size\n"); /* Now with the original returned size */ SetLastError(0xdeadbeef); displaysize = tempsize; ret = GetServiceDisplayNameA(scm_handle, spooler, displayname, &displaysize); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(displaysize == tempsize, "Expected no change for the needed buffer size\n"); /* And with a bigger than needed buffer */ SetLastError(0xdeadbeef); displaysize = tempsize * 2; ret = GetServiceDisplayNameA(scm_handle, spooler, displayname, &displaysize); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); /* Test that shows that if the buffersize is enough, it's not changed */ ok(displaysize == tempsize * 2, "Expected no change for the needed buffer size\n"); ok(strlen(displayname) == tempsize/2, @@ -629,7 +629,7 @@ static void test_get_displayname(void) ret = GetServiceDisplayNameW(scm_handle, spoolerW, NULL, &displaysize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* Buffer is too small */ SetLastError(0xdeadbeef); @@ -639,7 +639,7 @@ static void test_get_displayname(void) ok(!ret, "Expected failure\n"); ok(displaysize == tempsizeW, "Expected the needed buffersize\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* Now with the original returned size */ SetLastError(0xdeadbeef); @@ -648,13 +648,13 @@ static void test_get_displayname(void) ok(!ret, "Expected failure\n"); ok(displaysize == tempsizeW, "Expected the needed buffersize\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* And with a bigger than needed buffer */ SetLastError(0xdeadbeef); displaysize = tempsizeW + 1; /* This caters for the null terminating character */ ret = GetServiceDisplayNameW(scm_handle, spoolerW, displaynameW, &displaysize); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(displaysize == tempsizeW, "Expected the needed buffersize\n"); ok(lstrlenW(displaynameW) == displaysize, "Expected the buffer to be the length of the string\n") ; @@ -678,7 +678,7 @@ static void test_get_displayname(void) svc_handle = CreateServiceA(scm_handle, servicename, NULL, DELETE, SERVICE_WIN32_OWN_PROCESS | SERVICE_INTERACTIVE_PROCESS, SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); - ok(svc_handle != NULL, "Could not create the service : %d\n", GetLastError()); + ok(svc_handle != NULL, "Could not create the service : %ld\n", GetLastError()); if (!svc_handle) { CloseServiceHandle(scm_handle); @@ -693,7 +693,7 @@ static void test_get_displayname(void) ok(displaysize == strlen(servicename) * 2, "Expected the displaysize to be twice the size of the servicename\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* Buffer is too small */ SetLastError(0xdeadbeef); @@ -703,18 +703,18 @@ static void test_get_displayname(void) ok(!ret, "Expected failure\n"); ok(displaysize == tempsize, "Expected the needed buffersize\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* Get the displayname */ SetLastError(0xdeadbeef); ret = GetServiceDisplayNameA(scm_handle, servicename, displayname, &displaysize); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(!lstrcmpiA(displayname, servicename), "Expected displayname to be %s, got %s\n", servicename, displayname); /* Delete the service */ ret = DeleteService(svc_handle); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); CloseServiceHandle(svc_handle); CloseServiceHandle(scm_handle); @@ -739,7 +739,7 @@ static void test_get_servicekeyname(void) ret = GetServiceKeyNameA(NULL, NULL, NULL, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); scm_handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); @@ -749,8 +749,8 @@ static void test_get_servicekeyname(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, XP, W2K3, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); - todo_wine ok(servicesize == 1, "Service size expected 1, got %d\n", servicesize); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); + todo_wine ok(servicesize == 1, "Service size expected 1, got %ld\n", servicesize); /* Valid handle and buffer but no displayname */ servicesize = 200; @@ -759,24 +759,24 @@ static void test_get_servicekeyname(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS /* W2K, XP, W2K3, Vista */ || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); - todo_wine ok(servicesize == 200, "Service size expected 1, got %d\n", servicesize); + "Expected ERROR_INVALID_ADDRESS or ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); + todo_wine ok(servicesize == 200, "Service size expected 1, got %ld\n", servicesize); /* Test for nonexistent displayname */ SetLastError(0xdeadbeef); ret = GetServiceKeyNameA(scm_handle, deadbeef, NULL, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(servicesize == 1, "Service size expected 1, got %d\n", servicesize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(servicesize == 1, "Service size expected 1, got %ld\n", servicesize); servicesize = 15; strcpy(servicename, "ABC"); ret = GetServiceKeyNameA(scm_handle, deadbeef, servicename, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(servicesize == 15, "Service size expected 15, got %d\n", servicesize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(servicesize == 15, "Service size expected 15, got %ld\n", servicesize); ok(servicename[0] == 0, "Service name not empty\n"); servicesize = 15; @@ -784,8 +784,8 @@ static void test_get_servicekeyname(void) ret = GetServiceKeyNameW(scm_handle, deadbeefW, servicenameW, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - ok(servicesize == 15, "Service size expected 15, got %d\n", servicesize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + ok(servicesize == 15, "Service size expected 15, got %ld\n", servicesize); ok(servicenameW[0] == 0, "Service name not empty\n"); servicesize = 0; @@ -793,17 +793,17 @@ static void test_get_servicekeyname(void) ret = GetServiceKeyNameA(scm_handle, deadbeef, servicename, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(servicesize == 1, "Service size expected 1, got %d\n", servicesize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(servicesize == 1, "Service size expected 1, got %ld\n", servicesize); ok(servicename[0] == 'A', "Service name changed\n"); servicesize = 0; lstrcpyW( servicenameW, abcW ); ret = GetServiceKeyNameW(scm_handle, deadbeefW, servicenameW, &servicesize); ok(!ret, "Expected failure\n"); - ok(servicesize == 2, "Service size expected 2, got %d\n", servicesize); + ok(servicesize == 2, "Service size expected 2, got %ld\n", servicesize); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); ok(servicenameW[0] == 'A', "Service name changed\n"); servicesize = 1; @@ -811,17 +811,17 @@ static void test_get_servicekeyname(void) ret = GetServiceKeyNameA(scm_handle, deadbeef, servicename, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(servicesize == 1, "Service size expected 1, got %d\n", servicesize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(servicesize == 1, "Service size expected 1, got %ld\n", servicesize); ok(servicename[0] == 0, "Service name not empty\n"); servicesize = 1; lstrcpyW( servicenameW, abcW ); ret = GetServiceKeyNameW(scm_handle, deadbeefW, servicenameW, &servicesize); ok(!ret, "Expected failure\n"); - ok(servicesize == 2, "Service size expected 2, got %d\n", servicesize); + ok(servicesize == 2, "Service size expected 2, got %ld\n", servicesize); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); ok(servicenameW[0] == 'A', "Service name changed\n"); servicesize = 2; @@ -829,17 +829,17 @@ static void test_get_servicekeyname(void) ret = GetServiceKeyNameA(scm_handle, deadbeef, servicename, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); - todo_wine ok(servicesize == 2, "Service size expected 2, got %d\n", servicesize); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); + todo_wine ok(servicesize == 2, "Service size expected 2, got %ld\n", servicesize); ok(servicename[0] == 0, "Service name not empty\n"); servicesize = 2; lstrcpyW( servicenameW, abcW ); ret = GetServiceKeyNameW(scm_handle, deadbeefW, servicenameW, &servicesize); ok(!ret, "Expected failure\n"); - ok(servicesize == 2, "Service size expected 2, got %d\n", servicesize); + ok(servicesize == 2, "Service size expected 2, got %ld\n", servicesize); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); ok(servicenameW[0] == 0, "Service name not empty\n"); /* Check if 'Spooler' exists */ @@ -870,14 +870,14 @@ static void test_get_servicekeyname(void) } ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); /* Valid call with the correct buffersize */ SetLastError(0xdeadbeef); tempsize = servicesize; servicesize *= 2; ret = GetServiceKeyNameA(scm_handle, displayname, servicename, &servicesize); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); if (ret) { ok(strlen(servicename) == tempsize/2, @@ -891,7 +891,7 @@ static void test_get_servicekeyname(void) SetLastError(0xdeadbeef); servicesize *= 2; ret = GetServiceKeyNameW(scm_handle, displaynameW, servicenameW, &servicesize); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); if (ret) { ok(strlen(servicename) == tempsize/2, @@ -905,7 +905,7 @@ static void test_get_servicekeyname(void) ret = GetServiceKeyNameW(scm_handle, displaynameW, servicenameW, &servicesize); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); ok(servicenameW[0] == 0, "Buffer not empty\n"); CloseServiceHandle(scm_handle); @@ -924,7 +924,7 @@ static void test_query_svc(void) ret = QueryServiceStatus(NULL, NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); scm_handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); @@ -944,13 +944,13 @@ static void test_query_svc(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = QueryServiceStatus(svc_handle, &status); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_ACCESS_DENIED, - "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); /* Open the service with just enough rights. * (Verified with 'SERVICE_ALL_ACCESS &~ SERVICE_QUERY_STATUS') @@ -960,7 +960,7 @@ static void test_query_svc(void) SetLastError(0xdeadbeef); ret = QueryServiceStatus(svc_handle, &status); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); CloseServiceHandle(svc_handle); @@ -980,7 +980,7 @@ static void test_query_svc(void) ret = pQueryServiceStatusEx(NULL, 1, NULL, 0, NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_LEVEL, - "Expected ERROR_INVALID_LEVEL, got %d\n", GetLastError()); + "Expected ERROR_INVALID_LEVEL, got %ld\n", GetLastError()); /* Passing a NULL parameter for the needed buffer size * will crash on anything but NT4. @@ -994,9 +994,9 @@ static void test_query_svc(void) { ok(!ret, "Expected failure\n"); ok(needed == sizeof(SERVICE_STATUS_PROCESS), - "Needed buffersize is wrong : %d\n", needed); + "Needed buffersize is wrong : %ld\n", needed); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); } /* Pass a correct buffer and buffersize but a NULL handle */ @@ -1006,7 +1006,7 @@ static void test_query_svc(void) ret = pQueryServiceStatusEx(NULL, SC_STATUS_PROCESS_INFO, (BYTE*)statusproc, bufsize, &needed); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); HeapFree(GetProcessHeap(), 0, statusproc); /* Correct handle and info level */ @@ -1017,9 +1017,9 @@ static void test_query_svc(void) { ok(!ret, "Expected failure\n"); ok(needed == sizeof(SERVICE_STATUS_PROCESS), - "Needed buffersize is wrong : %d\n", needed); + "Needed buffersize is wrong : %ld\n", needed); ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); } /* All parameters are OK but we don't have enough rights */ @@ -1029,7 +1029,7 @@ static void test_query_svc(void) ret = pQueryServiceStatusEx(svc_handle, SC_STATUS_PROCESS_INFO, (BYTE*)statusproc, bufsize, &needed); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_ACCESS_DENIED, - "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); HeapFree(GetProcessHeap(), 0, statusproc); /* Open the service with just enough rights. */ @@ -1041,7 +1041,7 @@ static void test_query_svc(void) bufsize = sizeof(SERVICE_STATUS_PROCESS); SetLastError(0xdeadbeef); ret = pQueryServiceStatusEx(svc_handle, SC_STATUS_PROCESS_INFO, (BYTE*)statusproc, bufsize, &needed); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); if (statusproc->dwCurrentState == SERVICE_RUNNING) ok(statusproc->dwProcessId != 0, "Expect a process id for this running service\n"); @@ -1054,7 +1054,7 @@ static void test_query_svc(void) ret = pQueryServiceStatusEx(svc_handle, SC_STATUS_PROCESS_INFO, (BYTE*)statusproc, bufsize, NULL); ok(!ret, "Expected failure\n"); ok(broken(GetLastError() == ERROR_INVALID_PARAMETER) /* NT4 */ || - GetLastError() == ERROR_INVALID_ADDRESS, "got %d\n", GetLastError()); + GetLastError() == ERROR_INVALID_ADDRESS, "got %ld\n", GetLastError()); HeapFree(GetProcessHeap(), 0, statusproc); @@ -1080,13 +1080,13 @@ static void test_enum_svc(void) ret = EnumServicesStatusA(NULL, 1, 0, NULL, 0, NULL, NULL, NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = EnumServicesStatusW(NULL, 1, 0, NULL, 0, NULL, NULL, NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); /* Open the service control manager with not enough rights at first */ scm_handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); @@ -1097,14 +1097,14 @@ static void test_enum_svc(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = EnumServicesStatusW(scm_handle, 1, 0, NULL, 0, NULL, NULL, NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); /* Don't specify the two required pointers */ returned = 0xdeadbeef; @@ -1114,7 +1114,7 @@ static void test_enum_svc(void) ok(returned == 0xdeadbeef, "Expected no change to the number of services variable\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); returned = 0xdeadbeef; SetLastError(0xdeadbeef); @@ -1123,7 +1123,7 @@ static void test_enum_svc(void) ok(returned == 0xdeadbeef, "Expected no change to the number of services variable\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); /* Don't specify the two required pointers */ needed = 0xdeadbeef; @@ -1134,7 +1134,7 @@ static void test_enum_svc(void) "Expected no change to the needed buffer variable\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); needed = 0xdeadbeef; SetLastError(0xdeadbeef); @@ -1144,7 +1144,7 @@ static void test_enum_svc(void) "Expected no change to the needed buffer variable\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); /* No valid servicetype and servicestate */ needed = 0xdeadbeef; @@ -1153,10 +1153,10 @@ static void test_enum_svc(void) ret = EnumServicesStatusA(scm_handle, 0, 0, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); - ok(returned == 0, "Expected number of services to be set to 0, got %d\n", returned); + "Expected needed buffer size to be set to 0, got %ld\n", needed); + ok(returned == 0, "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); needed = 0xdeadbeef; returned = 0xdeadbeef; @@ -1164,11 +1164,11 @@ static void test_enum_svc(void) ret = EnumServicesStatusW(scm_handle, 0, 0, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(returned == 0 || broken(returned != 0), /* nt4 */ - "Expected number of services to be set to 0, got %d\n", returned); + "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* No valid servicestate */ needed = 0xdeadbeef; @@ -1177,10 +1177,10 @@ static void test_enum_svc(void) ret = EnumServicesStatusA(scm_handle, SERVICE_WIN32, 0, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); - ok(returned == 0, "Expected number of services to be set to 0, got %d\n", returned); + "Expected needed buffer size to be set to 0, got %ld\n", needed); + ok(returned == 0, "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); needed = 0xdeadbeef; returned = 0xdeadbeef; @@ -1188,11 +1188,11 @@ static void test_enum_svc(void) ret = EnumServicesStatusW(scm_handle, SERVICE_WIN32, 0, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(returned == 0 || broken(returned != 0), /* nt4 */ - "Expected number of services to be set to 0, got %d\n", returned); + "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* No valid servicetype */ needed = 0xdeadbeef; @@ -1201,10 +1201,10 @@ static void test_enum_svc(void) ret = EnumServicesStatusA(scm_handle, 0, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); - ok(returned == 0, "Expected number of services to be set to 0, got %d\n", returned); + "Expected needed buffer size to be set to 0, got %ld\n", needed); + ok(returned == 0, "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); needed = 0xdeadbeef; returned = 0xdeadbeef; @@ -1212,11 +1212,11 @@ static void test_enum_svc(void) ret = EnumServicesStatusW(scm_handle, 0, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(returned == 0 || broken(returned != 0), /* nt4 */ - "Expected number of services to be set to 0, got %d\n", returned); + "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* All parameters are correct but our access rights are wrong */ needed = 0xdeadbeef; @@ -1225,10 +1225,10 @@ static void test_enum_svc(void) ret = EnumServicesStatusA(scm_handle, SERVICE_WIN32, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); - ok(returned == 0, "Expected number of services to be set to 0, got %d\n", returned); + "Expected needed buffer size to be set to 0, got %ld\n", needed); + ok(returned == 0, "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_ACCESS_DENIED, - "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); needed = 0xdeadbeef; returned = 0xdeadbeef; @@ -1236,11 +1236,11 @@ static void test_enum_svc(void) ret = EnumServicesStatusW(scm_handle, SERVICE_WIN32, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(returned == 0 || broken(returned != 0), /* nt4 */ - "Expected number of services to be set to 0, got %d\n", returned); + "Expected number of services to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_ACCESS_DENIED, - "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); /* Open the service control manager with the needed rights */ CloseServiceHandle(scm_handle); @@ -1253,9 +1253,9 @@ static void test_enum_svc(void) ret = EnumServicesStatusA(scm_handle, SERVICE_WIN32, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL); ok(!ret, "Expected failure\n"); ok(needed != 0xdeadbeef && needed > 0, "Expected the needed buffer size for this one service\n"); - ok(returned == 0, "Expected no service returned, got %d\n", returned); + ok(returned == 0, "Expected no service returned, got %ld\n", returned); ok(GetLastError() == ERROR_MORE_DATA, - "Expected ERROR_MORE_DATA, got %d\n", GetLastError()); + "Expected ERROR_MORE_DATA, got %ld\n", GetLastError()); /* Test to show we get the same needed buffer size for the W-call */ neededW = 0xdeadbeef; @@ -1265,9 +1265,9 @@ static void test_enum_svc(void) ok(!ret, "Expected failure\n"); ok(neededW != 0xdeadbeef && neededW > 0, "Expected the needed buffer size for this one service\n"); ok(neededW == needed, "Expected needed buffersize to be the same for A- and W-calls\n"); - ok(returnedW == 0, "Expected no service returned, got %d\n", returnedW); + ok(returnedW == 0, "Expected no service returned, got %ld\n", returnedW); ok(GetLastError() == ERROR_MORE_DATA, - "Expected ERROR_MORE_DATA, got %d\n", GetLastError()); + "Expected ERROR_MORE_DATA, got %ld\n", GetLastError()); /* Store the needed bytes */ tempneeded = needed; @@ -1280,7 +1280,7 @@ static void test_enum_svc(void) SetLastError(0xdeadbeef); ret = EnumServicesStatusA(scm_handle, SERVICE_WIN32, SERVICE_STATE_ALL, services, bufsize, &needed, &returned, NULL); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(needed == 0, "Expected needed buffer to be 0 as we are done\n"); ok(returned != 0xdeadbeef && returned > 0, "Expected some returned services\n"); HeapFree(GetProcessHeap(), 0, services); @@ -1295,7 +1295,7 @@ static void test_enum_svc(void) SetLastError(0xdeadbeef); ret = EnumServicesStatusW(scm_handle, SERVICE_WIN32, SERVICE_STATE_ALL, servicesW, bufsize, &neededW, &returnedW, NULL); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(neededW == 0, "Expected needed buffer to be 0 as we are done\n"); ok(returnedW != 0xdeadbeef && returnedW > 0, "Expected some returned services\n"); HeapFree(GetProcessHeap(), 0, servicesW); @@ -1312,7 +1312,7 @@ static void test_enum_svc(void) ok(needed != 0xdeadbeef && needed > 0, "Expected the needed buffer size for this one service\n"); ok(returned < tempreturned, "Expected fewer services to be returned\n"); ok(GetLastError() == ERROR_MORE_DATA, - "Expected ERROR_MORE_DATA, got %d\n", GetLastError()); + "Expected ERROR_MORE_DATA, got %ld\n", GetLastError()); /* Allocate less than the needed bytes, this time with a correct resume handle */ bufsize = (tempreturned - 1) * sizeof(ENUM_SERVICE_STATUSA); @@ -1327,7 +1327,7 @@ static void test_enum_svc(void) ok(returned < tempreturned, "Expected fewer services to be returned\n"); todo_wine ok(resume, "Expected a resume handle\n"); ok(GetLastError() == ERROR_MORE_DATA, - "Expected ERROR_MORE_DATA, got %d\n", GetLastError()); + "Expected ERROR_MORE_DATA, got %ld\n", GetLastError()); /* Fetch the missing services but pass a bigger buffer size */ missing = tempreturned - returned; @@ -1337,9 +1337,9 @@ static void test_enum_svc(void) SetLastError(0xdeadbeef); ret = EnumServicesStatusA(scm_handle, SERVICE_WIN32, SERVICE_STATE_ALL, services, bufsize, &needed, &returned, &resume); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(needed == 0, "Expected needed buffer to be 0 as we are done\n"); - todo_wine ok(returned == missing, "Expected %u services to be returned\n", missing); + todo_wine ok(returned == missing, "Expected %lu services to be returned\n", missing); ok(resume == 0, "Expected the resume handle to be 0\n"); HeapFree(GetProcessHeap(), 0, services); @@ -1420,8 +1420,8 @@ static void test_enum_svc(void) } HeapFree(GetProcessHeap(), 0, services); - ok(servicecountactive == 0, "Active services mismatch %u\n", servicecountactive); - ok(servicecountinactive == 0, "Inactive services mismatch %u\n", servicecountinactive); + ok(servicecountactive == 0, "Active services mismatch %lu\n", servicecountactive); + ok(servicecountinactive == 0, "Inactive services mismatch %lu\n", servicecountinactive); CloseServiceHandle(scm_handle); @@ -1437,14 +1437,14 @@ static void test_enum_svc(void) ret = pEnumServicesStatusExA(NULL, 1, 0, 0, NULL, 0, NULL, NULL, NULL, NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_LEVEL, - "Expected ERROR_INVALID_LEVEL, got %d\n", GetLastError()); + "Expected ERROR_INVALID_LEVEL, got %ld\n", GetLastError()); /* All NULL or wrong, just the info level is correct */ SetLastError(0xdeadbeef); ret = pEnumServicesStatusExA(NULL, 0, 0, 0, NULL, 0, NULL, NULL, NULL, NULL); ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_HANDLE, - "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); /* Open the service control manager with not enough rights at first */ scm_handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); @@ -1455,7 +1455,7 @@ static void test_enum_svc(void) ok(!ret, "Expected failure\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); /* Don't specify the two required pointers */ needed = 0xdeadbeef; @@ -1466,7 +1466,7 @@ static void test_enum_svc(void) "Expected no change to the needed buffer variable\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); /* Don't specify the two required pointers */ returned = 0xdeadbeef; @@ -1476,7 +1476,7 @@ static void test_enum_svc(void) ok(returned == 0xdeadbeef, "Expected no change to the number of services variable\n"); ok(GetLastError() == ERROR_INVALID_ADDRESS || GetLastError() == ERROR_INVALID_PARAMETER /* NT4 */, - "Unexpected last error %d\n", GetLastError()); + "Unexpected last error %ld\n", GetLastError()); /* No valid servicetype and servicestate */ needed = 0xdeadbeef; @@ -1484,11 +1484,11 @@ static void test_enum_svc(void) SetLastError(0xdeadbeef); ret = pEnumServicesStatusExA(scm_handle, 0, 0, 0, NULL, 0, &needed, &returned, NULL, NULL); ok(!ret, "Expected failure\n"); - ok(returned == 0, "Expected number of service to be set to 0, got %d\n", returned); + ok(returned == 0, "Expected number of service to be set to 0, got %ld\n", returned); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* No valid servicestate */ needed = 0xdeadbeef; @@ -1497,11 +1497,11 @@ static void test_enum_svc(void) ret = pEnumServicesStatusExA(scm_handle, 0, SERVICE_WIN32, 0, NULL, 0, &needed, &returned, NULL, NULL); ok(!ret, "Expected failure\n"); - ok(returned == 0, "Expected number of service to be set to 0, got %d\n", returned); + ok(returned == 0, "Expected number of service to be set to 0, got %ld\n", returned); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* No valid servicetype */ needed = 0xdeadbeef; @@ -1510,11 +1510,11 @@ static void test_enum_svc(void) ret = pEnumServicesStatusExA(scm_handle, 0, 0, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL, NULL); ok(!ret, "Expected failure\n"); - ok(returned == 0, "Expected number of service to be set to 0, got %d\n", returned); + ok(returned == 0, "Expected number of service to be set to 0, got %ld\n", returned); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* No valid servicetype and servicestate and unknown service group */ needed = 0xdeadbeef; @@ -1523,11 +1523,11 @@ static void test_enum_svc(void) ret = pEnumServicesStatusExA(scm_handle, 0, 0, 0, NULL, 0, &needed, &returned, NULL, "deadbeef_group"); ok(!ret, "Expected failure\n"); - ok(returned == 0, "Expected number of service to be set to 0, got %d\n", returned); + ok(returned == 0, "Expected number of service to be set to 0, got %ld\n", returned); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); + "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(GetLastError() == ERROR_INVALID_PARAMETER, - "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError()); + "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError()); /* All parameters are correct but our access rights are wrong */ needed = 0xdeadbeef; @@ -1537,10 +1537,10 @@ static void test_enum_svc(void) NULL, 0, &needed, &returned, NULL, NULL); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); - ok(returned == 0, "Expected number of service to be set to 0, got %d\n", returned); + "Expected needed buffer size to be set to 0, got %ld\n", needed); + ok(returned == 0, "Expected number of service to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_ACCESS_DENIED, - "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); /* All parameters are correct, access rights are wrong but the * group name won't be checked yet. @@ -1552,10 +1552,10 @@ static void test_enum_svc(void) NULL, 0, &needed, &returned, NULL, "deadbeef_group"); ok(!ret, "Expected failure\n"); ok(needed == 0 || broken(needed != 0), /* nt4 */ - "Expected needed buffer size to be set to 0, got %d\n", needed); - ok(returned == 0, "Expected number of service to be set to 0, got %d\n", returned); + "Expected needed buffer size to be set to 0, got %ld\n", needed); + ok(returned == 0, "Expected number of service to be set to 0, got %ld\n", returned); ok(GetLastError() == ERROR_ACCESS_DENIED, - "Expected ERROR_ACCESS_DENIED, got %d\n", GetLastError()); + "Expected ERROR_ACCESS_DENIED, got %ld\n", GetLastError()); /* Open the service control manager with the needed rights */ CloseServiceHandle(scm_handle); @@ -1568,10 +1568,10 @@ static void test_enum_svc(void) ret = pEnumServicesStatusExA(scm_handle, 0, SERVICE_WIN32, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL, "deadbeef_group"); ok(!ret, "Expected failure\n"); - ok(returned == 0, "Expected number of service to be set to 0, got %d\n", returned); - ok(needed == 0, "Expected needed buffer size to be set to 0, got %d\n", needed); + ok(returned == 0, "Expected number of service to be set to 0, got %ld\n", returned); + ok(needed == 0, "Expected needed buffer size to be set to 0, got %ld\n", needed); ok(GetLastError() == ERROR_SERVICE_DOES_NOT_EXIST, - "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_DOES_NOT_EXIST, got %ld\n", GetLastError()); /* TODO: Create a test that makes sure we enumerate all services that don't * belong to a group. (specifying ""). @@ -1584,10 +1584,10 @@ static void test_enum_svc(void) ret = pEnumServicesStatusExA(scm_handle, 0, SERVICE_WIN32, SERVICE_STATE_ALL, NULL, 0, &needed, &returned, NULL, NULL); ok(!ret, "Expected failure\n"); - ok(returned == 0, "Expected no service returned, got %d\n", returned); + ok(returned == 0, "Expected no service returned, got %ld\n", returned); ok(needed != 0xdeadbeef && needed > 0, "Expected the needed buffer size\n"); ok(GetLastError() == ERROR_MORE_DATA, - "Expected ERROR_MORE_DATA, got %d\n", GetLastError()); + "Expected ERROR_MORE_DATA, got %ld\n", GetLastError()); /* Test to show we get the same needed buffer size for the W-call */ neededW = 0xdeadbeef; @@ -1607,7 +1607,7 @@ static void test_enum_svc(void) SetLastError(0xdeadbeef); ret = pEnumServicesStatusExA(scm_handle, 0, SERVICE_WIN32, SERVICE_STATE_ALL, (BYTE*)exservices, bufsize, &needed, &returned, NULL, NULL); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(needed == 0, "Expected needed buffer to be 0 as we are done\n"); ok(returned == tempreturned, "Expected the same number of service from this function\n"); HeapFree(GetProcessHeap(), 0, exservices); @@ -1627,7 +1627,7 @@ static void test_enum_svc(void) ok(needed != 0xdeadbeef && needed > 0, "Expected the needed buffer size\n"); ok(returned < tempreturned, "Expected fewer services to be returned\n"); ok(GetLastError() == ERROR_MORE_DATA, - "Expected ERROR_MORE_DATA, got %d\n", GetLastError()); + "Expected ERROR_MORE_DATA, got %ld\n", GetLastError()); /* Allocate less than the needed bytes, this time with a correct resume handle */ bufsize = (tempreturned - 1) * sizeof(ENUM_SERVICE_STATUSA); @@ -1642,7 +1642,7 @@ static void test_enum_svc(void) ok(returned < tempreturned, "Expected fewer services to be returned\n"); todo_wine ok(resume, "Expected a resume handle\n"); ok(GetLastError() == ERROR_MORE_DATA, - "Expected ERROR_MORE_DATA, got %d\n", GetLastError()); + "Expected ERROR_MORE_DATA, got %ld\n", GetLastError()); /* Fetch that last service but pass a bigger buffer size */ missing = tempreturned - returned; @@ -1652,9 +1652,9 @@ static void test_enum_svc(void) SetLastError(0xdeadbeef); ret = pEnumServicesStatusExA(scm_handle, 0, SERVICE_WIN32, SERVICE_STATE_ALL, (BYTE*)exservices, bufsize, &needed, &returned, &resume, NULL); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(needed == 0, "Expected needed buffer to be 0 as we are done\n"); - ok(returned == missing, "Expected %u services to be returned\n", missing); + ok(returned == missing, "Expected %lu services to be returned\n", missing); ok(resume == 0, "Expected the resume handle to be 0\n"); HeapFree(GetProcessHeap(), 0, exservices); @@ -1699,7 +1699,7 @@ static void test_enum_svc(void) exservices = HeapAlloc(GetProcessHeap(), 0, needed); ret = pEnumServicesStatusExA(scm_handle, 0, SERVICE_WIN32 | SERVICE_DRIVER, SERVICE_STATE_ALL, (BYTE*)exservices, needed, &needed, &returned, NULL, NULL); - ok(ret, "Expected success %u\n", GetLastError()); + ok(ret, "Expected success %lu\n", GetLastError()); /* Loop through all those returned drivers and services */ for (i = 0; i < returned; i++) @@ -1734,7 +1734,7 @@ static void test_enum_svc(void) else { /* We shouldn't have a process id for inactive services */ - ok(status.dwProcessId == 0, "Service %s state %u shouldn't have an associated process id\n", + ok(status.dwProcessId == 0, "Service %s state %lu shouldn't have an associated process id\n", exservices[i].lpServiceName, status.dwCurrentState); servicecountinactive--; @@ -1743,8 +1743,8 @@ static void test_enum_svc(void) } HeapFree(GetProcessHeap(), 0, exservices); - ok(servicecountactive == 0, "Active services mismatch %u\n", servicecountactive); - ok(servicecountinactive == 0, "Inactive services mismatch %u\n", servicecountinactive); + ok(servicecountactive == 0, "Active services mismatch %lu\n", servicecountactive); + ok(servicecountinactive == 0, "Inactive services mismatch %lu\n", servicecountinactive); CloseServiceHandle(scm_handle); } @@ -1758,7 +1758,7 @@ static void test_close(void) SetLastError(0xdeadbeef); ret = CloseServiceHandle(NULL); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError()); /* TODO: Add some tests with invalid handles. These produce errors on Windows but crash on Wine */ @@ -1766,7 +1766,7 @@ static void test_close(void) handle = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); SetLastError(0xdeadbeef); ret = CloseServiceHandle(handle); - ok(ret, "Expected success got error %u\n", GetLastError()); + ok(ret, "Expected success got error %lu\n", GetLastError()); } static void test_wow64(void) @@ -1795,29 +1795,29 @@ static void test_wow64(void) SERVICE_START | SERVICE_STOP | SERVICE_QUERY_STATUS | DELETE, SERVICE_WIN32_OWN_PROCESS, SERVICE_DEMAND_START, SERVICE_ERROR_NORMAL, "C:\\windows\\system32\\winetestsvc.exe service serve", NULL, NULL, NULL, NULL, NULL); - ok(!!service, "Failed to create service, error %u.\n", GetLastError()); + ok(!!service, "Failed to create service, error %lu.\n", GetLastError()); ret = StartServiceA(service, 0, NULL); ok(!ret, "Expected failure.\n"); - ok(GetLastError() == ERROR_BAD_EXE_FORMAT, "Got error %u.\n", GetLastError()); + ok(GetLastError() == ERROR_BAD_EXE_FORMAT, "Got error %lu.\n", GetLastError()); ret = DeleteService(service); - ok(ret, "Failed to delete service, error %u.\n", GetLastError()); + ok(ret, "Failed to delete service, error %lu.\n", GetLastError()); CloseServiceHandle(service); service = CreateServiceA(manager, "winetestsvc2", "winetestsvc2", SERVICE_START | DELETE, SERVICE_KERNEL_DRIVER, SERVICE_DEMAND_START, SERVICE_ERROR_NORMAL, "C:\\windows\\system32\\winetestsvc.exe", NULL, NULL, NULL, NULL, NULL); - ok(!!service, "Failed to create service, error %u.\n", GetLastError()); + ok(!!service, "Failed to create service, error %lu.\n", GetLastError()); ret = StartServiceA(service, 0, NULL); ok(!ret, "Expected failure.\n"); - todo_wine ok(GetLastError() == ERROR_FILE_NOT_FOUND, "Got error %u.\n", GetLastError()); + todo_wine ok(GetLastError() == ERROR_FILE_NOT_FOUND, "Got error %lu.\n", GetLastError()); ret = DeleteService(service); - ok(ret, "Failed to delete service, error %u.\n", GetLastError()); + ok(ret, "Failed to delete service, error %lu.\n", GetLastError()); CloseServiceHandle(service); ret = DeleteFileA("C:\\windows\\syswow64\\winetestsvc.exe"); - ok(ret, "Failed to delete file, error %u.\n", GetLastError()); + ok(ret, "Failed to delete file, error %lu.\n", GetLastError()); file = CreateFileA("C:\\windows\\sysnative\\winetestsvc.exe", GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, 0, NULL); @@ -1826,29 +1826,29 @@ static void test_wow64(void) service = CreateServiceA(manager, "winetestsvc3", "winetestsvc3", SERVICE_START | DELETE, SERVICE_WIN32_OWN_PROCESS, SERVICE_DEMAND_START, SERVICE_ERROR_NORMAL, "C:\\windows\\system32\\winetestsvc.exe service serve", NULL, NULL, NULL, NULL, NULL); - ok(!!service, "Failed to create service, error %u.\n", GetLastError()); + ok(!!service, "Failed to create service, error %lu.\n", GetLastError()); ret = StartServiceA(service, 0, NULL); ok(!ret, "Expected failure.\n"); - ok(GetLastError() == ERROR_FILE_NOT_FOUND, "Got error %u.\n", GetLastError()); + ok(GetLastError() == ERROR_FILE_NOT_FOUND, "Got error %lu.\n", GetLastError()); ret = DeleteService(service); - ok(ret, "Failed to delete service, error %u.\n", GetLastError()); + ok(ret, "Failed to delete service, error %lu.\n", GetLastError()); CloseServiceHandle(service); service = CreateServiceA(manager, "winetestsvc4", "winetestsvc4", SERVICE_START | DELETE, SERVICE_KERNEL_DRIVER, SERVICE_DEMAND_START, SERVICE_ERROR_NORMAL, "C:\\windows\\system32\\winetestsvc.exe", NULL, NULL, NULL, NULL, NULL); - ok(!!service, "Failed to create service, error %u.\n", GetLastError()); + ok(!!service, "Failed to create service, error %lu.\n", GetLastError()); ret = StartServiceA(service, 0, NULL); ok(!ret, "Expected failure.\n"); - todo_wine ok(GetLastError() == ERROR_BAD_EXE_FORMAT, "Got error %u.\n", GetLastError()); + todo_wine ok(GetLastError() == ERROR_BAD_EXE_FORMAT, "Got error %lu.\n", GetLastError()); ret = DeleteService(service); - ok(ret, "Failed to delete service, error %u.\n", GetLastError()); + ok(ret, "Failed to delete service, error %lu.\n", GetLastError()); CloseServiceHandle(service); ret = DeleteFileA("C:\\windows\\sysnative\\winetestsvc.exe"); - ok(ret, "Failed to delete file, error %u.\n", GetLastError()); + ok(ret, "Failed to delete file, error %lu.\n", GetLastError()); CloseServiceHandle(manager); } @@ -1877,7 +1877,7 @@ static void test_sequence(void) return; } else - ok(scm_handle != NULL, "Could not get a handle to the manager: %d\n", GetLastError()); + ok(scm_handle != NULL, "Could not get a handle to the manager: %ld\n", GetLastError()); if (!scm_handle) return; svc_handle = OpenServiceA(scm_handle, NULL, GENERIC_READ); @@ -1904,7 +1904,7 @@ static void test_sequence(void) CloseServiceHandle(scm_handle); return; } - ok(svc_handle != NULL, "Could not open the service : %d\n", GetLastError()); + ok(svc_handle != NULL, "Could not open the service : %ld\n", GetLastError()); } else if (!svc_handle && (GetLastError() == ERROR_ACCESS_DENIED)) { @@ -1914,7 +1914,7 @@ static void test_sequence(void) } else { - ok(svc_handle != NULL, "Could not create the service : %d\n", GetLastError()); + ok(svc_handle != NULL, "Could not create the service : %ld\n", GetLastError()); if (svc_handle != NULL) { PSID sidOwner, sidGroup; @@ -1928,23 +1928,23 @@ static void test_sequence(void) retval = GetSecurityInfo(svc_handle, SE_SERVICE, DACL_SECURITY_INFORMATION, &sidOwner, &sidGroup, &dacl, &sacl, &pSD); LocalFree(pSD); - ok(retval == ERROR_SUCCESS, "Expected GetSecurityInfo to succeed: result %d\n", retval); + ok(retval == ERROR_SUCCESS, "Expected GetSecurityInfo to succeed: result %ld\n", retval); retval = GetSecurityInfo(svc_handle, SE_SERVICE, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, &pSD); LocalFree(pSD); - ok(retval == ERROR_SUCCESS, "Expected GetSecurityInfo to succeed: result %d\n", retval); + ok(retval == ERROR_SUCCESS, "Expected GetSecurityInfo to succeed: result %ld\n", retval); if (!is_nt4) { retval = GetSecurityInfo(svc_handle, SE_SERVICE, DACL_SECURITY_INFORMATION, NULL, NULL, &dacl, NULL, &pSD); - ok(retval == ERROR_SUCCESS, "Expected GetSecurityInfo to succeed: result %d\n", retval); + ok(retval == ERROR_SUCCESS, "Expected GetSecurityInfo to succeed: result %ld\n", retval); LocalFree(pSD); SetLastError(0xdeadbeef); retval = GetSecurityInfo(svc_handle, SE_SERVICE, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, NULL); error = GetLastError(); - ok(retval == ERROR_INVALID_PARAMETER, "Expected GetSecurityInfo to fail: result %d\n", retval); - ok(error == 0xdeadbeef, "Unexpected last error %d\n", error); + ok(retval == ERROR_INVALID_PARAMETER, "Expected GetSecurityInfo to fail: result %ld\n", retval); + ok(error == 0xdeadbeef, "Unexpected last error %ld\n", error); } else win_skip("A NULL security descriptor in GetSecurityInfo results in an exception on NT4.\n"); @@ -1956,7 +1956,7 @@ static void test_sequence(void) ok(!bret, "Expected QueryServiceObjectSecurity to fail: result %d\n", bret); ok(error == ERROR_INSUFFICIENT_BUFFER || broken(error == ERROR_INVALID_ADDRESS) || broken(error == ERROR_INVALID_PARAMETER), - "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", error); + "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", error); if (error != ERROR_INSUFFICIENT_BUFFER) n1 = 1024; pSD = LocalAlloc(0, n1); bret = pQueryServiceObjectSecurity(svc_handle, DACL_SECURITY_INFORMATION, pSD, n1, &n2); @@ -1979,23 +1979,23 @@ static void test_sequence(void) SetLastError(0xdeadbeef); ret = QueryServiceConfigA(svc_handle, NULL, 0, &needed); ok(!ret, "Expected failure\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); config = HeapAlloc(GetProcessHeap(), 0, needed); given = needed; SetLastError(0xdeadbeef); ret = QueryServiceConfigA(svc_handle, config, given, &needed); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); ok(config->lpBinaryPathName && config->lpLoadOrderGroup && config->lpDependencies && config->lpServiceStartName && config->lpDisplayName, "Expected all string struct members to be non-NULL\n"); ok(config->dwServiceType == (SERVICE_INTERACTIVE_PROCESS | SERVICE_WIN32_OWN_PROCESS), - "Expected SERVICE_INTERACTIVE_PROCESS | SERVICE_WIN32_OWN_PROCESS, got %d\n", config->dwServiceType); - ok(config->dwStartType == SERVICE_DISABLED, "Expected SERVICE_DISABLED, got %d\n", config->dwStartType); - ok(config->dwErrorControl == SERVICE_ERROR_IGNORE, "Expected SERVICE_ERROR_IGNORE, got %d\n", config->dwErrorControl); + "Expected SERVICE_INTERACTIVE_PROCESS | SERVICE_WIN32_OWN_PROCESS, got %ld\n", config->dwServiceType); + ok(config->dwStartType == SERVICE_DISABLED, "Expected SERVICE_DISABLED, got %ld\n", config->dwStartType); + ok(config->dwErrorControl == SERVICE_ERROR_IGNORE, "Expected SERVICE_ERROR_IGNORE, got %ld\n", config->dwErrorControl); ok(!strcmp(config->lpBinaryPathName, pathname), "Expected '%s', got '%s'\n", pathname, config->lpBinaryPathName); ok(!strcmp(config->lpLoadOrderGroup, empty), "Expected an empty string, got '%s'\n", config->lpLoadOrderGroup); - ok(config->dwTagId == 0, "Expected 0, got %d\n", config->dwTagId); + ok(config->dwTagId == 0, "Expected 0, got %ld\n", config->dwTagId); /* TODO: Show the double 0 terminated string */ todo_wine { @@ -2006,7 +2006,7 @@ static void test_sequence(void) ret = ChangeServiceConfigA(svc_handle, SERVICE_NO_CHANGE, SERVICE_NO_CHANGE, SERVICE_ERROR_NORMAL, NULL, "TestGroup2", NULL, NULL, NULL, NULL, displayname2); - ok(ret, "ChangeServiceConfig failed (err=%d)\n", GetLastError()); + ok(ret, "ChangeServiceConfig failed (err=%ld)\n", GetLastError()); QueryServiceConfigA(svc_handle, NULL, 0, &needed); config = HeapReAlloc(GetProcessHeap(), 0, config, needed); @@ -2014,18 +2014,18 @@ static void test_sequence(void) ok(config->lpBinaryPathName && config->lpLoadOrderGroup && config->lpDependencies && config->lpServiceStartName && config->lpDisplayName, "Expected all string struct members to be non-NULL\n"); ok(config->dwServiceType == (SERVICE_INTERACTIVE_PROCESS | SERVICE_WIN32_OWN_PROCESS), - "Expected SERVICE_INTERACTIVE_PROCESS | SERVICE_WIN32_OWN_PROCESS, got %d\n", config->dwServiceType); - ok(config->dwStartType == SERVICE_DISABLED, "Expected SERVICE_DISABLED, got %d\n", config->dwStartType); - ok(config->dwErrorControl == SERVICE_ERROR_NORMAL, "Expected SERVICE_ERROR_NORMAL, got %d\n", config->dwErrorControl); + "Expected SERVICE_INTERACTIVE_PROCESS | SERVICE_WIN32_OWN_PROCESS, got %ld\n", config->dwServiceType); + ok(config->dwStartType == SERVICE_DISABLED, "Expected SERVICE_DISABLED, got %ld\n", config->dwStartType); + ok(config->dwErrorControl == SERVICE_ERROR_NORMAL, "Expected SERVICE_ERROR_NORMAL, got %ld\n", config->dwErrorControl); ok(!strcmp(config->lpBinaryPathName, pathname), "Expected '%s', got '%s'\n", pathname, config->lpBinaryPathName); ok(!strcmp(config->lpLoadOrderGroup, "TestGroup2"), "Expected 'TestGroup2', got '%s'\n", config->lpLoadOrderGroup); - ok(config->dwTagId == 0, "Expected 0, got %d\n", config->dwTagId); + ok(config->dwTagId == 0, "Expected 0, got %ld\n", config->dwTagId); ok(!strcmp(config->lpServiceStartName, localsystem), "Expected 'LocalSystem', got '%s'\n", config->lpServiceStartName); ok(!strcmp(config->lpDisplayName, displayname2), "Expected '%s', got '%s'\n", displayname2, config->lpDisplayName); SetLastError(0xdeadbeef); ret = DeleteService(svc_handle); - ok(ret, "Expected success, got error %u\n", GetLastError()); + ok(ret, "Expected success, got error %lu\n", GetLastError()); CloseServiceHandle(svc_handle); CloseServiceHandle(scm_handle); HeapFree(GetProcessHeap(), 0, config); @@ -2064,7 +2064,7 @@ static void test_queryconfig2(void) if(GetLastError() == ERROR_ACCESS_DENIED) skip("Not enough rights to get a handle to the manager\n"); else - ok(FALSE, "Could not get a handle to the manager: %d\n", GetLastError()); + ok(FALSE, "Could not get a handle to the manager: %ld\n", GetLastError()); return; } @@ -2089,7 +2089,7 @@ static void test_queryconfig2(void) if(GetLastError() == ERROR_ACCESS_DENIED) skip("Not enough rights to open the service\n"); else - ok(FALSE, "Could not open the service : %d\n", GetLastError()); + ok(FALSE, "Could not open the service : %ld\n", GetLastError()); CloseServiceHandle(scm_handle); return; } @@ -2100,7 +2100,7 @@ static void test_queryconfig2(void) CloseServiceHandle(scm_handle); return; } - ok(svc_handle != NULL, "Could not create the service : %d\n", GetLastError()); + ok(svc_handle != NULL, "Could not create the service : %ld\n", GetLastError()); if (!svc_handle) { CloseServiceHandle(scm_handle); @@ -2110,49 +2110,49 @@ static void test_queryconfig2(void) SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle,0xfff0,buffer,sizeof(SERVICE_DESCRIPTIONA),&needed); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INVALID_LEVEL == GetLastError(), "expected error ERROR_INVALID_LEVEL, got %d\n", GetLastError()); + ok(ERROR_INVALID_LEVEL == GetLastError(), "expected error ERROR_INVALID_LEVEL, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle,0xfff0,buffer,sizeof(SERVICE_DESCRIPTIONA),NULL); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INVALID_LEVEL == GetLastError(), "expected error ERROR_INVALID_LEVEL, got %d\n", GetLastError()); + ok(ERROR_INVALID_LEVEL == GetLastError(), "expected error ERROR_INVALID_LEVEL, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,buffer,sizeof(SERVICE_DESCRIPTIONA),NULL); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INVALID_ADDRESS == GetLastError(), "expected error ERROR_INVALID_ADDRESS, got %d\n", GetLastError()); + ok(ERROR_INVALID_ADDRESS == GetLastError(), "expected error ERROR_INVALID_ADDRESS, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,NULL,sizeof(SERVICE_DESCRIPTIONA),&needed); ok(!ret, "expected QueryServiceConfig2A to fail\n"); ok((ERROR_INVALID_ADDRESS == GetLastError()) || (ERROR_INSUFFICIENT_BUFFER == GetLastError()), - "expected error ERROR_INVALID_ADDRESS or ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + "expected error ERROR_INVALID_ADDRESS or ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,NULL,sizeof(SERVICE_DESCRIPTIONA),NULL); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INVALID_ADDRESS == GetLastError(), "expected error ERROR_INVALID_ADDRESS, got %d\n", GetLastError()); + ok(ERROR_INVALID_ADDRESS == GetLastError(), "expected error ERROR_INVALID_ADDRESS, got %ld\n", GetLastError()); needed = 0; SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,buffer,sizeof(SERVICE_DESCRIPTIONA)-1,&needed); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(needed == sizeof(SERVICE_DESCRIPTIONA), "got %d\n", needed); + ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(needed == sizeof(SERVICE_DESCRIPTIONA), "got %ld\n", needed); needed = 0; pConfig->lpDescription = (LPSTR)0xdeadbeef; ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,buffer,sizeof(SERVICE_DESCRIPTIONA),&needed); ok(ret, "expected QueryServiceConfig2A to succeed\n"); - ok(needed == sizeof(SERVICE_DESCRIPTIONA), "got %d\n", needed); + ok(needed == sizeof(SERVICE_DESCRIPTIONA), "got %ld\n", needed); ok(!pConfig->lpDescription, "expected lpDescription to be NULL, got %p\n", pConfig->lpDescription); SetLastError(0xdeadbeef); needed = 0; ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,NULL,0,&needed); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(needed == sizeof(SERVICE_DESCRIPTIONA), "got %d\n", needed); + ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(needed == sizeof(SERVICE_DESCRIPTIONA), "got %ld\n", needed); if(!pChangeServiceConfig2A) { @@ -2172,13 +2172,13 @@ static void test_queryconfig2(void) expected = sizeof(SERVICE_DESCRIPTIONA) + sizeof(description) * sizeof(WCHAR); /* !! */ ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,buffer,sizeof(SERVICE_DESCRIPTIONA),&needed); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(needed == expected, "expected needed to be %d, got %d\n", expected, needed); + ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(needed == expected, "expected needed to be %ld, got %ld\n", expected, needed); SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,buffer,needed-1,&needed); ok(!ret, "expected QueryServiceConfig2A to fail\n"); - ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); + ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); SetLastError(0xdeadbeef); ret = pQueryServiceConfig2A(svc_handle, SERVICE_CONFIG_DESCRIPTION,buffer,needed,&needed); @@ -2202,8 +2202,8 @@ static void test_queryconfig2(void) expected = sizeof(SERVICE_DESCRIPTIONW) + sizeof(WCHAR) * sizeof(description); ret = pQueryServiceConfig2W(svc_handle, SERVICE_CONFIG_DESCRIPTION,NULL,0,&needed); ok(!ret, "expected QueryServiceConfig2W to fail\n"); - ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError()); - ok(needed == expected, "expected needed to be %d, got %d\n", expected, needed); + ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(), "expected error ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError()); + ok(needed == expected, "expected needed to be %ld, got %ld\n", expected, needed); SetLastError(0xdeadbeef); ret = pQueryServiceConfig2W(svc_handle, SERVICE_CONFIG_DESCRIPTION,buffer, needed,&needed); @@ -2278,23 +2278,23 @@ static void test_queryconfig2(void) win_skip("SERVICE_CONFIG_PRESHUTDOWN_INFO not supported\n"); goto cleanup; } - ok(ret, "expected QueryServiceConfig2W to succeed (%d)\n", GetLastError()); - ok(needed == sizeof(preshutdown_info), "needed = %d\n", needed); + ok(ret, "expected QueryServiceConfig2W to succeed (%ld)\n", GetLastError()); + ok(needed == sizeof(preshutdown_info), "needed = %ld\n", needed); ok(preshutdown_info.dwPreshutdownTimeout == 180000 || preshutdown_info.dwPreshutdownTimeout == 10000 /* Win10 1709+ */, - "Default PreshutdownTimeout = %d\n", preshutdown_info.dwPreshutdownTimeout); + "Default PreshutdownTimeout = %ld\n", preshutdown_info.dwPreshutdownTimeout); SetLastError(0xdeadbeef); preshutdown_info.dwPreshutdownTimeout = -1; ret = pChangeServiceConfig2A(svc_handle, SERVICE_CONFIG_PRESHUTDOWN_INFO, (LPVOID)&preshutdown_info); - ok(ret, "expected ChangeServiceConfig2A to succeed (%d)\n", GetLastError()); + ok(ret, "expected ChangeServiceConfig2A to succeed (%ld)\n", GetLastError()); ret = pQueryServiceConfig2W(svc_handle, SERVICE_CONFIG_PRESHUTDOWN_INFO, (LPBYTE)&preshutdown_info, sizeof(preshutdown_info), &needed); - ok(ret, "expected QueryServiceConfig2W to succeed (%d)\n", GetLastError()); - ok(needed == sizeof(preshutdown_info), "needed = %d\n", needed); - ok(preshutdown_info.dwPreshutdownTimeout == -1, "New PreshutdownTimeout = %d\n", + ok(ret, "expected QueryServiceConfig2W to succeed (%ld)\n", GetLastError()); + ok(needed == sizeof(preshutdown_info), "needed = %ld\n", needed); + ok(preshutdown_info.dwPreshutdownTimeout == -1, "New PreshutdownTimeout = %ld\n", preshutdown_info.dwPreshutdownTimeout); cleanup: @@ -2319,24 +2319,24 @@ static DWORD try_start_stop(SC_HANDLE svc_handle, const char* name, DWORD is_nt4 SERVICE_STATUS_PROCESS statusproc; ret = pQueryServiceStatusEx(svc_handle, SC_STATUS_PROCESS_INFO, (BYTE*)&statusproc, sizeof(statusproc), &needed); - ok(ret, "%s: QueryServiceStatusEx() failed le=%u\n", name, GetLastError()); - ok(statusproc.dwCurrentState == SERVICE_STOPPED, "%s: should be stopped state=%x\n", name, statusproc.dwCurrentState); - ok(statusproc.dwProcessId == 0, "%s: ProcessId should be 0 instead of %x\n", name, statusproc.dwProcessId); + ok(ret, "%s: QueryServiceStatusEx() failed le=%lu\n", name, GetLastError()); + ok(statusproc.dwCurrentState == SERVICE_STOPPED, "%s: should be stopped state=%lx\n", name, statusproc.dwCurrentState); + ok(statusproc.dwProcessId == 0, "%s: ProcessId should be 0 instead of %lx\n", name, statusproc.dwProcessId); } ret = StartServiceA(svc_handle, 0, NULL); le2 = GetLastError(); ok(!ret, "%s: StartServiceA() should have failed\n", name); - ok(le2 == le1, "%s: the second try should yield the same error: %u != %u\n", name, le1, le2); + ok(le2 == le1, "%s: the second try should yield the same error: %lu != %lu\n", name, le1, le2); status.dwCurrentState = 0xdeadbeef; ret = ControlService(svc_handle, SERVICE_CONTROL_STOP, &status); le2 = GetLastError(); ok(!ret, "%s: ControlService() should have failed\n", name); - ok(le2 == ERROR_SERVICE_NOT_ACTIVE, "%s: %d != ERROR_SERVICE_NOT_ACTIVE\n", name, le2); + ok(le2 == ERROR_SERVICE_NOT_ACTIVE, "%s: %ld != ERROR_SERVICE_NOT_ACTIVE\n", name, le2); ok(status.dwCurrentState == SERVICE_STOPPED || broken(is_nt4), /* NT4 returns a random value */ - "%s: should be stopped state=%x\n", name, status.dwCurrentState); + "%s: should be stopped state=%lx\n", name, status.dwCurrentState); return le1; } @@ -2358,20 +2358,20 @@ static void CALLBACK notify_cb(void *user) { case PHASE_STOPPED: ok(data->notify.dwNotificationStatus == ERROR_SUCCESS, - "Got wrong notification status: %u\n", data->notify.dwNotificationStatus); + "Got wrong notification status: %lu\n", data->notify.dwNotificationStatus); ok(data->notify.ServiceStatus.dwCurrentState == SERVICE_STOPPED, - "Got wrong service state: 0x%x\n", data->notify.ServiceStatus.dwCurrentState); + "Got wrong service state: 0x%lx\n", data->notify.ServiceStatus.dwCurrentState); ok(data->notify.dwNotificationTriggered == SERVICE_NOTIFY_STOPPED, - "Got wrong notification triggered: 0x%x\n", data->notify.dwNotificationTriggered); + "Got wrong notification triggered: 0x%lx\n", data->notify.dwNotificationTriggered); break; case PHASE_RUNNING: ok(data->notify.dwNotificationStatus == ERROR_SUCCESS, - "Got wrong notification status: %u\n", data->notify.dwNotificationStatus); + "Got wrong notification status: %lu\n", data->notify.dwNotificationStatus); ok(data->notify.ServiceStatus.dwCurrentState == SERVICE_RUNNING, - "Got wrong service state: 0x%x\n", data->notify.ServiceStatus.dwCurrentState); + "Got wrong service state: 0x%lx\n", data->notify.ServiceStatus.dwCurrentState); ok(data->notify.dwNotificationTriggered == SERVICE_NOTIFY_RUNNING, - "Got wrong notification triggered: 0x%x\n", data->notify.dwNotificationTriggered); + "Got wrong notification triggered: 0x%lx\n", data->notify.dwNotificationTriggered); break; } @@ -2408,24 +2408,24 @@ static void test_servicenotify(SC_HANDLE scm_handle, const char *servicename) data.was_called = FALSE; dr = pNotifyServiceStatusChangeW(svc, SERVICE_NOTIFY_STOPPED | SERVICE_NOTIFY_RUNNING, &data.notify); - ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %u\n", dr); + ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %lu\n", dr); dr = SleepEx(100, TRUE); - ok(dr == WAIT_IO_COMPLETION, "Got wrong SleepEx result: %u\n", dr); + ok(dr == WAIT_IO_COMPLETION, "Got wrong SleepEx result: %lu\n", dr); ok(data.was_called == TRUE, "APC wasn't called\n"); br = StartServiceA(svc, 0, NULL); - ok(br, "StartService failed: %u\n", GetLastError()); + ok(br, "StartService failed: %lu\n", GetLastError()); /* receive running notification */ data.phase = PHASE_RUNNING; data.was_called = FALSE; dr = pNotifyServiceStatusChangeW(svc, SERVICE_NOTIFY_STOPPED | SERVICE_NOTIFY_RUNNING, &data.notify); - ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %u\n", dr); + ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %lu\n", dr); dr = SleepEx(100, TRUE); - ok(dr == WAIT_IO_COMPLETION, "Got wrong SleepEx result: %u\n", dr); + ok(dr == WAIT_IO_COMPLETION, "Got wrong SleepEx result: %lu\n", dr); ok(data.was_called == TRUE, "APC wasn't called\n"); /* cannot register two notifications on the same handle */ @@ -2433,7 +2433,7 @@ static void test_servicenotify(SC_HANDLE scm_handle, const char *servicename) data.was_called = FALSE; dr = pNotifyServiceStatusChangeW(svc, SERVICE_NOTIFY_STOPPED | SERVICE_NOTIFY_RUNNING, &data.notify); - ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %u\n", dr); + ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %lu\n", dr); memset(&data2.notify, 0, sizeof(data2.notify)); data2.notify.dwVersion = SERVICE_NOTIFY_STATUS_CHANGE; @@ -2443,17 +2443,17 @@ static void test_servicenotify(SC_HANDLE scm_handle, const char *servicename) data2.was_called = FALSE; dr = pNotifyServiceStatusChangeW(svc, SERVICE_NOTIFY_STOPPED | SERVICE_NOTIFY_RUNNING, &data2.notify); - ok(dr == ERROR_ALREADY_REGISTERED || !dr /* Win8+ */, "wrong error %u\n", dr); + ok(dr == ERROR_ALREADY_REGISTERED || !dr /* Win8+ */, "wrong error %lu\n", dr); if (!dr) { dr = SleepEx(100, TRUE); - ok(dr == WAIT_IO_COMPLETION, "got %u\n", dr); + ok(dr == WAIT_IO_COMPLETION, "got %lu\n", dr); ok(data2.was_called, "APC was not called\n"); } else { dr = SleepEx(100, TRUE); - ok(!dr, "got %u\n", dr); + ok(!dr, "got %lu\n", dr); ok(!data2.was_called, "APC should not have been called\n"); } ok(data.was_called == FALSE, "APC should not have been called\n"); @@ -2468,15 +2468,15 @@ static void test_servicenotify(SC_HANDLE scm_handle, const char *servicename) /* it's possible to have multiple notifications using different service handles */ dr = pNotifyServiceStatusChangeW(svc2, SERVICE_NOTIFY_STOPPED, &data2.notify); - ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW gave wrong result: %u\n", dr); + ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW gave wrong result: %lu\n", dr); /* stop service and receive notifiction */ br = ControlService(svc, SERVICE_CONTROL_STOP, &status); - ok(br, "ControlService failed: %u\n", GetLastError()); + ok(br, "ControlService failed: %lu\n", GetLastError()); dr = SleepEx(100, TRUE); dr2 = SleepEx(100, TRUE); - ok(dr == WAIT_IO_COMPLETION || dr2 == WAIT_IO_COMPLETION, "Got wrong SleepEx result: %u\n", dr); + ok(dr == WAIT_IO_COMPLETION || dr2 == WAIT_IO_COMPLETION, "Got wrong SleepEx result: %lu\n", dr); ok(data.was_called == TRUE, "APC wasn't called\n"); ok(data2.was_called == TRUE, "APC wasn't called\n"); @@ -2487,19 +2487,19 @@ static void test_servicenotify(SC_HANDLE scm_handle, const char *servicename) data.phase = PHASE_RUNNING; data.was_called = FALSE; dr = pNotifyServiceStatusChangeW(svc, SERVICE_NOTIFY_STOPPED | SERVICE_NOTIFY_RUNNING, &data.notify); - ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %u\n", dr); + ok(dr == ERROR_SUCCESS, "NotifyServiceStatusChangeW failed: %lu\n", dr); CloseServiceHandle(svc); br = StartServiceA(svc2, 0, NULL); - ok(br, "StartService failed: %u\n", GetLastError()); + ok(br, "StartService failed: %lu\n", GetLastError()); dr = SleepEx(100, TRUE); - ok(dr == 0, "Got wrong SleepEx result: %u\n", dr); + ok(dr == 0, "Got wrong SleepEx result: %lu\n", dr); ok(data.was_called == FALSE, "APC should not have been called\n"); br = ControlService(svc2, SERVICE_CONTROL_STOP, &status); - ok(br, "ControlService failed: %u\n", GetLastError()); + ok(br, "ControlService failed: %lu\n", GetLastError()); CloseServiceHandle(svc2); } @@ -2520,7 +2520,7 @@ static void test_start_stop(void) if(GetLastError() == ERROR_ACCESS_DENIED) skip("Not enough rights to get a handle to the manager\n"); else - ok(FALSE, "Could not get a handle to the manager: %d\n", GetLastError()); + ok(FALSE, "Could not get a handle to the manager: %ld\n", GetLastError()); return; } @@ -2548,16 +2548,16 @@ static void test_start_stop(void) if(GetLastError() == ERROR_ACCESS_DENIED) skip("Not enough rights to create the service\n"); else - ok(FALSE, "Could not create the service: %d\n", GetLastError()); + ok(FALSE, "Could not create the service: %ld\n", GetLastError()); goto cleanup; } le = try_start_stop(svc_handle, displayname, is_nt4); - ok(le == ERROR_SERVICE_DISABLED, "%d != ERROR_SERVICE_DISABLED\n", le); + ok(le == ERROR_SERVICE_DISABLED, "%ld != ERROR_SERVICE_DISABLED\n", le); /* Then one with a bad path */ displayname = "Winetest Bad Path"; ret = ChangeServiceConfigA(svc_handle, SERVICE_NO_CHANGE, SERVICE_DEMAND_START, SERVICE_NO_CHANGE, "c:\\no_such_file.exe", NULL, NULL, NULL, NULL, NULL, displayname); - ok(ret, "ChangeServiceConfig() failed le=%u\n", GetLastError()); + ok(ret, "ChangeServiceConfig() failed le=%lu\n", GetLastError()); try_start_stop(svc_handle, displayname, is_nt4); if (is_nt4) @@ -2572,15 +2572,15 @@ static void test_start_stop(void) /* Again with a process that exits right away */ displayname = "Winetest Exit Service"; ret = ChangeServiceConfigA(svc_handle, SERVICE_NO_CHANGE, SERVICE_NO_CHANGE, SERVICE_NO_CHANGE, cmd, NULL, NULL, NULL, NULL, NULL, displayname); - ok(ret, "ChangeServiceConfig() failed le=%u\n", GetLastError()); + ok(ret, "ChangeServiceConfig() failed le=%lu\n", GetLastError()); le = try_start_stop(svc_handle, displayname, is_nt4); - ok(le == ERROR_SERVICE_REQUEST_TIMEOUT, "%d != ERROR_SERVICE_REQUEST_TIMEOUT\n", le); + ok(le == ERROR_SERVICE_REQUEST_TIMEOUT, "%ld != ERROR_SERVICE_REQUEST_TIMEOUT\n", le); /* create a real service and test notifications */ sprintf(cmd, "%s service serve", selfname); displayname = "Winetest Service"; ret = ChangeServiceConfigA(svc_handle, SERVICE_NO_CHANGE, SERVICE_NO_CHANGE, SERVICE_NO_CHANGE, cmd, NULL, NULL, NULL, NULL, NULL, displayname); - ok(ret, "ChangeServiceConfig() failed le=%u\n", GetLastError()); + ok(ret, "ChangeServiceConfig() failed le=%lu\n", GetLastError()); test_servicenotify(scm_handle, servicename); cleanup: @@ -2612,31 +2612,31 @@ static void test_refcount(void) svc_handle1 = CreateServiceA(scm_handle, servicename, NULL, GENERIC_ALL, SERVICE_WIN32_OWN_PROCESS | SERVICE_INTERACTIVE_PROCESS, SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); - ok(svc_handle1 != NULL, "Expected success, got error %u\n", GetLastError()); + ok(svc_handle1 != NULL, "Expected success, got error %lu\n", GetLastError()); /* Get a handle to this new service */ svc_handle2 = OpenServiceA(scm_handle, servicename, GENERIC_READ); - ok(svc_handle2 != NULL, "Expected success, got error %u\n", GetLastError()); + ok(svc_handle2 != NULL, "Expected success, got error %lu\n", GetLastError()); /* Get another handle to this new service */ svc_handle3 = OpenServiceA(scm_handle, servicename, GENERIC_READ); - ok(svc_handle3 != NULL, "Expected success, got error %u\n", GetLastError()); + ok(svc_handle3 != NULL, "Expected success, got error %lu\n", GetLastError()); /* Check if we can close the handle to the Service Control Manager */ ret = CloseServiceHandle(scm_handle); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); /* Get a new handle to the Service Control Manager */ scm_handle = OpenSCManagerA(NULL, NULL, GENERIC_ALL); - ok(scm_handle != NULL, "Expected success, got error %u\n", GetLastError()); + ok(scm_handle != NULL, "Expected success, got error %lu\n", GetLastError()); /* Get a handle to this new service */ svc_handle4 = OpenServiceA(scm_handle, servicename, GENERIC_ALL); - ok(svc_handle4 != NULL, "Expected success, got error %u\n", GetLastError()); + ok(svc_handle4 != NULL, "Expected success, got error %lu\n", GetLastError()); /* Delete the service */ ret = DeleteService(svc_handle4); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); /* We cannot create the same service again as it's still marked as 'being deleted'. * The reason is that we still have 4 open handles to this service even though we @@ -2648,17 +2648,17 @@ static void test_refcount(void) SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); ok(!svc_handle5, "Expected failure\n"); ok(GetLastError() == ERROR_SERVICE_MARKED_FOR_DELETE, - "Expected ERROR_SERVICE_MARKED_FOR_DELETE, got %d\n", GetLastError()); + "Expected ERROR_SERVICE_MARKED_FOR_DELETE, got %ld\n", GetLastError()); /* Close all the handles to the service and try again */ ret = CloseServiceHandle(svc_handle4); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); ret = CloseServiceHandle(svc_handle3); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); ret = CloseServiceHandle(svc_handle2); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); ret = CloseServiceHandle(svc_handle1); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); /* Wait a while. Doing a CreateService too soon will result again * in an ERROR_SERVICE_MARKED_FOR_DELETE error. @@ -2669,11 +2669,11 @@ static void test_refcount(void) svc_handle5 = CreateServiceA(scm_handle, servicename, NULL, GENERIC_ALL, SERVICE_WIN32_OWN_PROCESS | SERVICE_INTERACTIVE_PROCESS, SERVICE_DISABLED, 0, pathname, NULL, NULL, NULL, NULL, NULL); - ok(svc_handle5 != NULL, "Expected success, got error %u\n", GetLastError()); + ok(svc_handle5 != NULL, "Expected success, got error %lu\n", GetLastError()); /* Delete the service */ ret = DeleteService(svc_handle5); - ok(ret, "Expected success (err=%d)\n", GetLastError()); + ok(ret, "Expected success (err=%ld)\n", GetLastError()); CloseServiceHandle(svc_handle5); CloseServiceHandle(scm_handle); } @@ -2707,30 +2707,30 @@ static void test_EventLog(void) SERVICE_STATUS_PROCESS status; scm_handle = OpenSCManagerA(NULL, NULL, GENERIC_READ); - ok(scm_handle != NULL, "OpenSCManager error %u\n", GetLastError()); + ok(scm_handle != NULL, "OpenSCManager error %lu\n", GetLastError()); svc_handle = OpenServiceA(scm_handle, "EventLog", GENERIC_READ); - ok(svc_handle != NULL, "OpenService error %u\n", GetLastError()); + ok(svc_handle != NULL, "OpenService error %lu\n", GetLastError()); SetLastError(0xdeadbeef); ret = QueryServiceConfigA(svc_handle, NULL, 0, &size); ok(!ret, "QueryServiceConfig should fail\n"); - ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %u\n", GetLastError()); + ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "got %lu\n", GetLastError()); config = HeapAlloc(GetProcessHeap(), 0, size); ret = QueryServiceConfigA(svc_handle, config, size, &size); - ok(ret, "QueryServiceConfig error %u\n", GetLastError()); + ok(ret, "QueryServiceConfig error %lu\n", GetLastError()); - ok(config->dwServiceType == SERVICE_WIN32_SHARE_PROCESS, "got %#x\n", config->dwServiceType); - ok(config->dwStartType == SERVICE_AUTO_START, "got %u\n", config->dwStartType); - ok(config->dwErrorControl == SERVICE_ERROR_NORMAL, "got %u\n", config->dwErrorControl); + ok(config->dwServiceType == SERVICE_WIN32_SHARE_PROCESS, "got %#lx\n", config->dwServiceType); + ok(config->dwStartType == SERVICE_AUTO_START, "got %lu\n", config->dwStartType); + ok(config->dwErrorControl == SERVICE_ERROR_NORMAL, "got %lu\n", config->dwErrorControl); ok(!strcmpi(config->lpBinaryPathName, "C:\\windows\\system32\\services.exe") /* XP */ || !strcmpi(config->lpBinaryPathName, "C:\\windows\\system32\\svchost.exe -k LocalServiceNetworkRestricted") /* Vista+ */ || !strcmpi(config->lpBinaryPathName, "C:\\windows\\system32\\svchost.exe -k LocalServiceNetworkRestricted -p") /* Win10 */, "got %s\n", config->lpBinaryPathName); todo_wine ok(!strcmpi(config->lpLoadOrderGroup, "Event Log"), "got %s\n", config->lpLoadOrderGroup); - ok(config->dwTagId == 0, "Expected 0, got %d\n", config->dwTagId); + ok(config->dwTagId == 0, "Expected 0, got %ld\n", config->dwTagId); ok(!config->lpDependencies[0], "lpDependencies is not empty\n"); ok(!strcmp(config->lpServiceStartName, "LocalSystem") /* XP */ || !strcmp(config->lpServiceStartName, "NT AUTHORITY\\LocalService"), @@ -2744,23 +2744,23 @@ static void test_EventLog(void) memset(&status, 0, sizeof(status)); size = sizeof(status); ret = QueryServiceStatusEx(svc_handle, SC_STATUS_PROCESS_INFO, (BYTE *)&status, size, &size); - ok(ret, "QueryServiceStatusEx error %u\n", GetLastError()); + ok(ret, "QueryServiceStatusEx error %lu\n", GetLastError()); ok(status.dwServiceType == SERVICE_WIN32_SHARE_PROCESS || status.dwServiceType == (SERVICE_WIN32_SHARE_PROCESS | SERVICE_WIN32_OWN_PROCESS) /* Win10 */, - "got %#x\n", status.dwServiceType); - ok(status.dwCurrentState == SERVICE_RUNNING, "got %#x\n", status.dwCurrentState); + "got %#lx\n", status.dwServiceType); + ok(status.dwCurrentState == SERVICE_RUNNING, "got %#lx\n", status.dwCurrentState); todo_wine ok(status.dwControlsAccepted == SERVICE_ACCEPT_SHUTDOWN /* XP */ || status.dwControlsAccepted == (SERVICE_ACCEPT_STOP | SERVICE_ACCEPT_SHUTDOWN) /* 2008 */ || status.dwControlsAccepted == (SERVICE_ACCEPT_STOP | SERVICE_ACCEPT_TIMECHANGE | SERVICE_ACCEPT_SHUTDOWN), - "got %#x\n", status.dwControlsAccepted); - ok(status.dwWin32ExitCode == 0, "got %#x\n", status.dwWin32ExitCode); - ok(status.dwServiceSpecificExitCode == 0, "got %#x\n", status.dwServiceSpecificExitCode); - ok(status.dwCheckPoint == 0, "got %#x\n", status.dwCheckPoint); - ok(status.dwWaitHint == 0, "got %#x\n", status.dwWaitHint); - ok(status.dwProcessId != 0, "got %#x\n", status.dwProcessId); + "got %#lx\n", status.dwControlsAccepted); + ok(status.dwWin32ExitCode == 0, "got %#lx\n", status.dwWin32ExitCode); + ok(status.dwServiceSpecificExitCode == 0, "got %#lx\n", status.dwServiceSpecificExitCode); + ok(status.dwCheckPoint == 0, "got %#lx\n", status.dwCheckPoint); + ok(status.dwWaitHint == 0, "got %#lx\n", status.dwWaitHint); + ok(status.dwProcessId != 0, "got %#lx\n", status.dwProcessId); ok(status.dwServiceFlags == 0 || status.dwServiceFlags == SERVICE_RUNS_IN_SYSTEM_PROCESS /* XP */, - "got %#x\n", status.dwServiceFlags); + "got %#lx\n", status.dwServiceFlags); CloseServiceHandle(svc_handle); CloseServiceHandle(scm_handle);