blob.length = r->in.data_in_len;
if (r->in.data_in_len < 4 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
/*
ndr_err = ndr_pull_struct_blob(&blob, mem_ctx, &uncrypt_request,
(ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_wrapped);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if ((uncrypt_request.version != BACKUPKEY_CLIENT_WRAP_VERSION2)
gnutls_strerror(rc),
error_string);
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_set_issuer_dn(issuer_cert, dn, &error_string);
gnutls_strerror(rc),
error_string);
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
/* Get x509 privkey for subjectPublicKeyInfo */
DBG_ERR("gnutls_x509_privkey_init failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_privkey_export_x509(issuer_privkey,
gnutls_strerror(rc));
gnutls_x509_privkey_deinit(x509_issuer_privkey);
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
/* Set subjectPublicKeyInfo */
DBG_ERR("gnutls_x509_crt_set_pubkey failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_set_activation_time(issuer_cert, activation);
DBG_ERR("gnutls_x509_crt_set_activation_time failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_set_expiration_time(issuer_cert, expiry);
DBG_ERR("gnutls_x509_crt_set_expiration_time failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_set_version(issuer_cert, 3);
DBG_ERR("gnutls_x509_crt_set_version failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_set_subject_unique_id(issuer_cert,
DBG_ERR("gnutls_x509_crt_set_subject_key_id failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_set_issuer_unique_id(issuer_cert,
DBG_ERR("gnutls_x509_crt_set_issuer_unique_id failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_set_serial(issuer_cert,
DBG_ERR("gnutls_x509_crt_set_serial failed - %s\n",
gnutls_strerror(rc));
gnutls_x509_crt_deinit(issuer_cert);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_x509_crt_privkey_sign(issuer_cert,
if (rc != GNUTLS_E_SUCCESS) {
DBG_ERR("gnutls_x509_crt_privkey_sign failed - %s\n",
gnutls_strerror(rc));
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
*certificate = issuer_cert;
blob.length = r->in.data_in_len;
if (r->in.data_in_len == 0 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
ndr_err = ndr_pull_struct_blob_all(&blob, mem_ctx, &decrypt_request,
(ndr_pull_flags_fn_t)ndr_pull_bkrp_server_side_wrapped);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (decrypt_request.magic != BACKUPKEY_SERVER_WRAP_VERSION) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
werr = bkrp_do_retrieve_server_wrap_key(mem_ctx, ldb_ctx, &server_key,
if (rc != GNUTLS_E_SUCCESS) {
DBG_ERR("gnutls_cipher_init failed - %s\n",
gnutls_strerror(rc));
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_cipher_encrypt2(cipher_hnd,
encrypted_blob.data,
if (rc != GNUTLS_E_SUCCESS) {
DBG_ERR("gnutls_cipher_encrypt2 failed - %s\n",
gnutls_strerror(rc));
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
ndr_err = ndr_pull_struct_blob_all(&encrypted_blob, mem_ctx, &rc4payload,
(ndr_pull_flags_fn_t)ndr_pull_bkrp_rc4encryptedpayload);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (decrypt_request.payload_length != rc4payload.secret_data.length) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
dump_data_pw("r3: \n", rc4payload.r3, sizeof(rc4payload.r3));
struct bkrp_BackupKey *r, struct ldb_context *ldb_ctx)
{
if (r->in.data_in_len < 4 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (IVAL(r->in.data_in, 0) == BACKUPKEY_SERVER_WRAP_VERSION) {
int rc;
if (r->in.data_in_len == 0 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
werr = bkrp_do_retrieve_default_server_wrap_key(mem_ctx,
if (rc != GNUTLS_E_SUCCESS) {
DBG_ERR("gnutls_cipher_init failed - %s\n",
gnutls_strerror(rc));
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
rc = gnutls_cipher_encrypt2(cipher_hnd,
encrypted_blob.data,
if (rc != GNUTLS_E_SUCCESS) {
DBG_ERR("gnutls_cipher_encrypt2 failed - %s\n",
gnutls_strerror(rc));
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
/* create server wrap structure */
static WERROR dcesrv_bkrp_BackupKey(struct dcesrv_call_state *dce_call,
TALLOC_CTX *mem_ctx, struct bkrp_BackupKey *r)
{
- WERROR error = WERR_INVALID_PARAM;
+ WERROR error = WERR_INVALID_PARAMETER;
struct ldb_context *ldb_ctx;
bool is_rodc;
const char *addr = "unknown";
if (samdb_rodc(ldb_ctx, &is_rodc) != LDB_SUCCESS) {
talloc_unlink(mem_ctx, ldb_ctx);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (!is_rodc) {
blob.length = r->in.data_in_len;
if (r->in.data_in_len < 4 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
/*
ndr_err = ndr_pull_struct_blob(&blob, mem_ctx, &uncrypt_request,
(ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_wrapped);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if ((uncrypt_request.version != BACKUPKEY_CLIENT_WRAP_VERSION2)
blob.length = r->in.data_in_len;
if (r->in.data_in_len == 0 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
ndr_err = ndr_pull_struct_blob_all(&blob, mem_ctx, &decrypt_request,
(ndr_pull_flags_fn_t)ndr_pull_bkrp_server_side_wrapped);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (decrypt_request.magic != BACKUPKEY_SERVER_WRAP_VERSION) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
werr = bkrp_do_retrieve_server_wrap_key(mem_ctx, ldb_ctx, &server_key,
ndr_err = ndr_pull_struct_blob_all(&encrypted_blob, mem_ctx, &rc4payload,
(ndr_pull_flags_fn_t)ndr_pull_bkrp_rc4encryptedpayload);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (decrypt_request.payload_length != rc4payload.secret_data.length) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
dump_data_pw("r3: \n", rc4payload.r3, sizeof(rc4payload.r3));
struct bkrp_BackupKey *r, struct ldb_context *ldb_ctx)
{
if (r->in.data_in_len < 4 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (IVAL(r->in.data_in, 0) == BACKUPKEY_SERVER_WRAP_VERSION) {
struct GUID guid;
if (r->in.data_in_len == 0 || r->in.data_in == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
werr = bkrp_do_retrieve_default_server_wrap_key(mem_ctx,
static WERROR dcesrv_bkrp_BackupKey(struct dcesrv_call_state *dce_call,
TALLOC_CTX *mem_ctx, struct bkrp_BackupKey *r)
{
- WERROR error = WERR_INVALID_PARAM;
+ WERROR error = WERR_INVALID_PARAMETER;
struct ldb_context *ldb_ctx;
bool is_rodc;
const char *addr = "unknown";
if (samdb_rodc(ldb_ctx, &is_rodc) != LDB_SUCCESS) {
talloc_unlink(mem_ctx, ldb_ctx);
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (!is_rodc) {
info[i].value = talloc_strdup(info, "IPC");
break;
default:
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
W_ERROR_HAVE_NO_MEMORY(info[i].value);
i++;
info[i].value = talloc_strdup(info, "IPC");
break;
default:
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
W_ERROR_HAVE_NO_MEMORY(info[i].value);
i++;
*/
if (strcmp("", r->in.share_name) == 0) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
nterr = share_get_context_by_name(mem_ctx, lpcfg_share_backend(dce_call->conn->dce_ctx->lp_ctx), dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, &sctx);
info[i].value = talloc_strdup(info, "IPC");
break;
default:
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
W_ERROR_HAVE_NO_MEMORY(info[i].value);
i++;
W_ERROR_HAVE_NO_MEMORY(info);
if (strcmp("", r->in.share_name) == 0) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
nterr = share_get_context_by_name(mem_ctx, lpcfg_share_backend(dce_call->conn->dce_ctx->lp_ctx), dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, &sctx);
case 13:
return WERR_NOT_SUPPORTED;
default:
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
}