@@ -1066,7 +1066,7 @@ PyDeleteKeyEx(PyObject *self, PyObject *args, PyObject *kwargs)
10661066
10671067 /* Only available on 64bit platforms, so we must load it
10681068 dynamically. */
1069- hMod = GetModuleHandle ( "advapi32.dll" );
1069+ hMod = GetModuleHandleW ( L "advapi32.dll" );
10701070 if (hMod )
10711071 pfn = (RDKEFunc )GetProcAddress (hMod ,
10721072 "RegDeleteKeyExW" );
@@ -1590,7 +1590,7 @@ PyDisableReflectionKey(PyObject *self, PyObject *args)
15901590
15911591 /* Only available on 64bit platforms, so we must load it
15921592 dynamically.*/
1593- hMod = GetModuleHandle ( "advapi32.dll" );
1593+ hMod = GetModuleHandleW ( L "advapi32.dll" );
15941594 if (hMod )
15951595 pfn = (RDRKFunc )GetProcAddress (hMod ,
15961596 "RegDisableReflectionKey" );
@@ -1626,7 +1626,7 @@ PyEnableReflectionKey(PyObject *self, PyObject *args)
16261626
16271627 /* Only available on 64bit platforms, so we must load it
16281628 dynamically.*/
1629- hMod = GetModuleHandle ( "advapi32.dll" );
1629+ hMod = GetModuleHandleW ( L "advapi32.dll" );
16301630 if (hMod )
16311631 pfn = (RERKFunc )GetProcAddress (hMod ,
16321632 "RegEnableReflectionKey" );
@@ -1663,7 +1663,7 @@ PyQueryReflectionKey(PyObject *self, PyObject *args)
16631663
16641664 /* Only available on 64bit platforms, so we must load it
16651665 dynamically.*/
1666- hMod = GetModuleHandle ( "advapi32.dll" );
1666+ hMod = GetModuleHandleW ( L "advapi32.dll" );
16671667 if (hMod )
16681668 pfn = (RQRKFunc )GetProcAddress (hMod ,
16691669 "RegQueryReflectionKey" );
0 commit comments