27 May
2019
27 May
'19
3:52 p.m.
https://bugs.winehq.org/show_bug.cgi?id=47274 --- Comment #2 from Gabriel Ivăncescu <gabrielopcode(a)gmail.com> --- Yeah. I've actually added a hack to GetProcAddress to return NULL if the passed string is "SaferIdentifyLevel" and that works too, so it seems cmd.exe loads it like that. Patching the string "SaferIdentifyLevel" in cmd.exe with a Hex Editor by replacing the first character with a NUL also works, even with the patch applied. I guess a proper fix would require a semi-implementation of these functions. -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.