err = ad_error(rep->r.ModifyResponse.errormessage, &endptr);
err_code_str = win_errstr(err);
printf(" - Errorcode: %s; Reason: %s\n", err_code_str, endptr);
- if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAM) &&
+ if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAMETER) &&
!W_ERROR_EQUAL(err, WERR_DS_UNWILLING_TO_PERFORM))
|| (rep->r.ModifyResponse.resultcode != LDAP_UNWILLING_TO_PERFORM)) {
return false;
err = ad_error(rep->r.ModifyResponse.errormessage, &endptr);
err_code_str = win_errstr(err);
printf(" - Errorcode: %s; Reason: %s\n", err_code_str, endptr);
- if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAM) &&
+ if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAMETER) &&
!W_ERROR_EQUAL(err, WERR_DS_UNWILLING_TO_PERFORM))
|| (rep->r.ModifyResponse.resultcode != LDAP_UNWILLING_TO_PERFORM)) {
return false;
err = ad_error(rep->r.ModifyDNResponse.errormessage, &endptr);
err_code_str = win_errstr(err);
printf(" - Errorcode: %s; Reason: %s\n", err_code_str, endptr);
- if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAM) &&
+ if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAMETER) &&
!W_ERROR_EQUAL(err, WERR_DS_NAMING_VIOLATION))
|| (rep->r.ModifyDNResponse.resultcode != LDAP_NAMING_VIOLATION)) {
return false;
err = ad_error(rep->r.ModifyDNResponse.errormessage, &endptr);
err_code_str = win_errstr(err);
printf(" - Errorcode: %s; Reason: %s\n", err_code_str, endptr);
- if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAM) &&
+ if ((!W_ERROR_EQUAL(err, WERR_INVALID_PARAMETER) &&
!W_ERROR_EQUAL(err, WERR_DS_PROTOCOL_ERROR))
|| (rep->r.ModifyDNResponse.resultcode != LDAP_PROTOCOL_ERROR)) {
return false;
{
torture_assert(tctx, GUID_all_zero(&r->out.new_handle->uuid), "new_handle");
torture_assert(tctx, r->out.action_taken == NULL, "action_taken pointer");
- torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM,
+ torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAMETER,
"return code");
return true;
static bool notifychangekeyvalue_out_check(struct torture_context *tctx, struct winreg_NotifyChangeKeyValue *r)
{
- torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "notify change key value");
+ torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAMETER, "notify change key value");
return true;
}
out_blob.length = *r->out.data_out_len;
ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
- torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "Wrong error code");
+ torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAMETER, "Wrong error code");
} else {
struct bkrp_BackupKey *r = createRetrieveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
out_blob.length = *r->out.data_out_len;
ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
- torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "Wrong error code on wrong version");
+ torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAMETER, "Wrong error code on wrong version");
} else {
struct bkrp_BackupKey *r = createRetrieveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
r->in.param = 0;
torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
out_blob.length = *r->out.data_out_len;
- torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "Bad error code on wrong has in access check");
+ torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAMETER, "Bad error code on wrong has in access check");
} else {
struct bkrp_BackupKey *r = createRetrieveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
}
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
}
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
+ WERR_INVALID_PARAMETER,
"decrypt should fail with WERR_INVALID_PARM");
/* Decrypt */
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
return true;
}
torture_assert_werr_equal(tctx,
r.out.result,
WERR_INVALID_SID,
- "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAM");
+ "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAMETER");
} else if (wrong == RIGHT_KEY) {
torture_assert_werr_equal(tctx,
r.out.result,
"decrypt should fail with WERR_INVALID_ACCESS");
} else {
if (!W_ERROR_EQUAL(r.out.result, WERR_INVALID_ACCESS)
- && !W_ERROR_EQUAL(r.out.result, WERR_INVALID_PARAM)) {
+ && !W_ERROR_EQUAL(r.out.result, WERR_INVALID_PARAMETER)) {
torture_assert_werr_equal(tctx, r.out.result,
WERR_INVALID_DATA,
- "decrypt should fail with WERR_INVALID_ACCESS, WERR_INVALID_PARAM or WERR_INVALID_DATA");
+ "decrypt should fail with WERR_INVALID_ACCESS, WERR_INVALID_PARAMETER or WERR_INVALID_DATA");
}
}
torture_assert_werr_equal(tctx,
r.out.result,
WERR_INVALID_SID,
- "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAM");
+ "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAMETER");
} else if (wrong == RIGHT_KEY) {
torture_assert_werr_equal(tctx,
r.out.result,
} else {
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
}
gnutls_global_deinit();
out_blob.length = *r->out.data_out_len;
ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
- if (!W_ERROR_EQUAL(r->out.result, WERR_INVALID_PARAM)) {
+ if (!W_ERROR_EQUAL(r->out.result, WERR_INVALID_PARAMETER)) {
torture_assert_werr_equal(tctx, r->out.result,
WERR_INVALID_DATA,
"Wrong error code");
out_blob.length = *r->out.data_out_len;
ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
- torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "Wrong error code on wrong version");
+ torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAMETER, "Wrong error code on wrong version");
} else {
struct bkrp_BackupKey *r = createRetrieveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
r->in.param = 0;
torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
out_blob.length = *r->out.data_out_len;
- torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "Bad error code on wrong has in access check");
+ torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAMETER, "Bad error code on wrong has in access check");
} else {
struct bkrp_BackupKey *r = createRetrieveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
}
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
}
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
/* Decrypt */
torture_assert_ntstatus_ok(tctx,
"decrypt");
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
- "decrypt should fail with WERR_INVALID_PARAM");
+ WERR_INVALID_PARAMETER,
+ "decrypt should fail with WERR_INVALID_PARAMETER");
return true;
}
torture_assert_werr_equal(tctx,
r.out.result,
WERR_INVALID_SID,
- "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAM");
+ "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAMETER");
} else if (wrong == RIGHT_KEY) {
torture_assert_werr_equal(tctx,
r.out.result,
WERR_INVALID_ACCESS,
"decrypt should fail with WERR_INVALID_ACCESS");
} else {
- if (!W_ERROR_EQUAL(r.out.result, WERR_INVALID_PARAM)) {
+ if (!W_ERROR_EQUAL(r.out.result, WERR_INVALID_PARAMETER)) {
torture_assert_werr_equal(tctx,
r.out.result,
WERR_INVALID_ACCESS,
- "decrypt should fail with WERR_INVALID_ACCESS or WERR_INVALID_PARAM");
+ "decrypt should fail with WERR_INVALID_ACCESS or WERR_INVALID_PARAMETER");
}
}
torture_assert_werr_equal(tctx,
r.out.result,
WERR_INVALID_SID,
- "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAM");
+ "decrypt should fail with WERR_INVALID_SID or WERR_INVALID_PARAMETER");
} else if (wrong == RIGHT_KEY) {
torture_assert_werr_equal(tctx,
r.out.result,
"decrypt should fail with WERR_INVALID_ACCESS");
} else {
if (!W_ERROR_EQUAL(r.out.result, WERR_INVALID_ACCESS)
- && !W_ERROR_EQUAL(r.out.result, WERR_INVALID_PARAM)) {
+ && !W_ERROR_EQUAL(r.out.result, WERR_INVALID_PARAMETER)) {
torture_assert_werr_equal(tctx, r.out.result,
WERR_INVALID_DATA,
- "decrypt should fail with WERR_INVALID_ACCESS, WERR_INVALID_PARAM or WERR_INVALID_DATA");
+ "decrypt should fail with WERR_INVALID_ACCESS, WERR_INVALID_PARAMETER or WERR_INVALID_DATA");
}
}
info.info.info100 = NULL;
status = dcerpc_BrowserrQueryOtherDomains_r(b, tctx, &r);
torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
- torture_assert_werr_equal(tctx, WERR_INVALID_PARAM, r.out.result,
+ torture_assert_werr_equal(tctx, WERR_INVALID_PARAMETER, r.out.result,
"BrowserrQueryOtherDomains failed");
info.level = 101;
torture_assert_ntstatus_ok(tctx, dcerpc_spoolss_SetPrinter_r(b, tctx, &r),
"failed to call SetPrinter");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
"failed to call SetPrinter");
again:
case 4:
case 5:
case 7:
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
"unexpected error code returned");
break;
case 9:
uint16_t __driverextra_length;/* [value(r->driverextra_data.length)] */
uint32_t fields;
#endif
- TEST_DEVMODE_INT_EXP(8, size, 8, size, __LINE__, WERR_INVALID_PARAM);
- TEST_DEVMODE_INT_EXP(8, size, 8, size, 0, WERR_INVALID_PARAM);
- TEST_DEVMODE_INT_EXP(8, size, 8, size, 0xffff, WERR_INVALID_PARAM);
- TEST_DEVMODE_INT_EXP(8, size, 8, size, ndr_size_spoolss_DeviceMode(devmode_ctr.devmode, 0), (devmode_ctr.devmode->__driverextra_length > 0 ) ? WERR_INVALID_PARAM : WERR_OK);
+ TEST_DEVMODE_INT_EXP(8, size, 8, size, __LINE__, WERR_INVALID_PARAMETER);
+ TEST_DEVMODE_INT_EXP(8, size, 8, size, 0, WERR_INVALID_PARAMETER);
+ TEST_DEVMODE_INT_EXP(8, size, 8, size, 0xffff, WERR_INVALID_PARAMETER);
+ TEST_DEVMODE_INT_EXP(8, size, 8, size, ndr_size_spoolss_DeviceMode(devmode_ctr.devmode, 0), (devmode_ctr.devmode->__driverextra_length > 0 ) ? WERR_INVALID_PARAMETER : WERR_OK);
TEST_DEVMODE_INT(8, size, 8, size, ndr_size_spoolss_DeviceMode(devmode_ctr.devmode, 0) - devmode_ctr.devmode->__driverextra_length);
devmode_ctr.devmode->driverextra_data = data_blob_string_const("foobar");
test_devmode_set_level(tctx, b, handle, 8, devmode_ctr.devmode),
"failed to set devmode");
- TEST_DEVMODE_INT_EXP(8, size, 8, size, ndr_size_spoolss_DeviceMode(devmode_ctr.devmode, 0), (devmode_ctr.devmode->__driverextra_length > 0 ) ? WERR_INVALID_PARAM : WERR_OK);
+ TEST_DEVMODE_INT_EXP(8, size, 8, size, ndr_size_spoolss_DeviceMode(devmode_ctr.devmode, 0), (devmode_ctr.devmode->__driverextra_length > 0 ) ? WERR_INVALID_PARAMETER : WERR_OK);
TEST_DEVMODE_INT(8, size, 8, size, ndr_size_spoolss_DeviceMode(devmode_ctr.devmode, 0) - devmode_ctr.devmode->__driverextra_length);
TEST_DEVMODE_INT(8, orientation, 8, orientation, __LINE__);
torture_assert_ntstatus_ok(tctx, dcerpc_spoolss_AddForm_r(b, tctx, &r),
"2nd AddForm failed");
- if (W_ERROR_EQUAL(expected_result, WERR_INVALID_PARAM)) {
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
+ if (W_ERROR_EQUAL(expected_result, WERR_INVALID_PARAMETER)) {
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
"2nd AddForm gave unexpected result");
} else {
torture_assert_werr_equal(tctx, r.out.result, WERR_FILE_EXISTS,
torture_assert_int_equal(tctx, info.info1.size.width, add_info.info1->size.width, "width mismatch");
}
- if (!W_ERROR_EQUAL(expected_add_result, WERR_INVALID_PARAM)) {
+ if (!W_ERROR_EQUAL(expected_add_result, WERR_INVALID_PARAMETER)) {
torture_assert(tctx,
test_EnumForms_find_one(tctx, b, handle, print_server, form_name),
"Newly added form not found in enum call");
.area = area,
},
.expected_add_result = WERR_OK,
- .expected_delete_result = WERR_INVALID_PARAM,
+ .expected_delete_result = WERR_INVALID_PARAMETER,
},
*/
{
.area = area,
},
.expected_add_result = WERR_FILE_EXISTS,
- .expected_delete_result = WERR_INVALID_PARAM
+ .expected_delete_result = WERR_INVALID_PARAMETER
},
{
.info1 = {
.area = area,
},
.expected_add_result = WERR_FILE_EXISTS,
- .expected_delete_result = WERR_INVALID_PARAM
+ .expected_delete_result = WERR_INVALID_PARAMETER
},
{
.info1 = {
.area = area,
},
.expected_add_result = WERR_FILE_EXISTS,
- .expected_delete_result = WERR_INVALID_PARAM
+ .expected_delete_result = WERR_INVALID_PARAMETER
},
{
.info1 = {
.size = size,
.area = area,
},
- .expected_add_result = WERR_INVALID_PARAM,
+ .expected_add_result = WERR_INVALID_PARAMETER,
.expected_delete_result = WERR_INVALID_FORM_NAME
}
status = dcerpc_spoolss_AddJob_r(b, tctx, &r);
torture_assert_ntstatus_ok(tctx, status, "AddJob failed");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM, "AddJob failed");
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER, "AddJob failed");
return true;
}
status = dcerpc_spoolss_OpenPrinterEx_r(b, tctx, &opEx);
torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed");
- torture_assert_werr_equal(tctx, opEx.out.result, WERR_INVALID_PARAM,
+ torture_assert_werr_equal(tctx, opEx.out.result, WERR_INVALID_PARAMETER,
"unexpected result");
if (W_ERROR_IS_OK(opEx.out.result)) {
if (ex) {
torture_assert(tctx,
- test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAM),
+ test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriverEx level 2");
} else {
torture_assert(tctx,
- test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAM),
+ test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriver level 2");
}
if (ex) {
torture_assert(tctx,
- test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAM),
+ test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriverEx level 2");
} else {
torture_assert(tctx,
- test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAM),
+ test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriver level 2");
}
if (ex) {
torture_assert(tctx,
- test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAM),
+ test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriverEx level 2");
} else {
torture_assert(tctx,
- test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAM),
+ test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriver level 2");
}
if (ex) {
torture_assert(tctx,
- test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAM),
+ test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriverEx level 2");
} else {
torture_assert(tctx,
- test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAM),
+ test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriver level 2");
}
if (ex) {
torture_assert(tctx,
- test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAM),
+ test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriverEx level 2");
} else {
torture_assert(tctx,
- test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAM),
+ test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriver level 2");
}
if (ex) {
torture_assert(tctx,
- test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAM),
+ test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, flags, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriverEx level 2");
} else {
torture_assert(tctx,
- test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAM),
+ test_AddPrinterDriver_exp(tctx, b, server_name, &info_ctr, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriver level 2");
}
if (ex) {
torture_assert(tctx,
- test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, 0, WERR_INVALID_PARAM),
+ test_AddPrinterDriverEx_exp(tctx, b, server_name, &info_ctr, 0, WERR_INVALID_PARAMETER),
"failed to test AddPrinterDriverEx");
}
ret &= test_OpenPrinterSequence(tctx, p, &handle01);
ret &= test_GetPrinterData(tctx, b, &handle01,"UISingleJobStatusString",
- WERR_INVALID_PARAM, 0);
+ WERR_INVALID_PARAMETER, 0);
torture_comment(tctx, "Skip RemoteFindNextPrinterChangeNotifyEx test\n");
server_name = talloc_asprintf(ctx, "\\\\%s", dcerpc_server_name(p));
}
ret &= test_EnumPrinterDataEx(tctx, b, &handle03, "", 0,
- WERR_INVALID_PARAM);
+ WERR_INVALID_PARAMETER);
ret &= test_GetPrinter(tctx, b, &handle03, tmp_ctx, 2, 0);
torture_assert_ntstatus_ok(tctx,
dcerpc_svcctl_QueryServiceObjectSecurity_r(b, tctx, &r),
"QueryServiceObjectSecurity failed!");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
"QueryServiceObjectSecurity failed!");
r.in.security_flags = SECINFO_DACL;
torture_assert_ntstatus_ok(tctx,
dcerpc_svcctl_ControlService_r(b, tctx, &r),
"ControlService failed!");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
"ControlService failed!");
if (!test_CloseServiceHandle(b, tctx, &s))
dcerpc_svcctl_EnumDependentServicesW_r(b, tctx, &r),
"EnumDependentServicesW failed!");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
"EnumDependentServicesW failed!");
for (i=0; i<ARRAY_SIZE(states); i++) {
false, (secinfo_verify_fn)_test_owner_present },
{ sd_owner, SECINFO_OWNER, WERR_OK,
true, (secinfo_verify_fn)_test_owner_present },
- { sd_owner, SECINFO_GROUP, WERR_INVALID_PARAM },
+ { sd_owner, SECINFO_GROUP, WERR_INVALID_PARAMETER },
{ sd_owner, SECINFO_DACL, WERR_OK,
true, (secinfo_verify_fn)_test_owner_present },
{ sd_owner, SECINFO_SACL, WERR_ACCESS_DENIED },
struct winreg_secinfo_table sec_info_group_tests[] = {
{ sd_group, 0, WERR_OK,
false, (secinfo_verify_fn)_test_group_present },
- { sd_group, SECINFO_OWNER, WERR_INVALID_PARAM },
+ { sd_group, SECINFO_OWNER, WERR_INVALID_PARAMETER },
{ sd_group, SECINFO_GROUP, WERR_OK,
true, (secinfo_verify_fn)_test_group_present },
{ sd_group, SECINFO_DACL, WERR_OK,
struct winreg_secinfo_table sec_info_dacl_tests[] = {
{ sd_dacl, 0, WERR_OK,
false, (secinfo_verify_fn)_test_dacl_trustee_present },
- { sd_dacl, SECINFO_OWNER, WERR_INVALID_PARAM },
- { sd_dacl, SECINFO_GROUP, WERR_INVALID_PARAM },
+ { sd_dacl, SECINFO_OWNER, WERR_INVALID_PARAMETER },
+ { sd_dacl, SECINFO_GROUP, WERR_INVALID_PARAMETER },
{ sd_dacl, SECINFO_DACL, WERR_OK,
true, (secinfo_verify_fn)_test_dacl_trustee_present },
{ sd_dacl, SECINFO_SACL, WERR_ACCESS_DENIED },
struct winreg_secinfo_table sec_info_sacl_tests[] = {
{ sd_sacl, 0, WERR_OK,
false, (secinfo_verify_fn)_test_sacl_trustee_present },
- { sd_sacl, SECINFO_OWNER, WERR_INVALID_PARAM },
- { sd_sacl, SECINFO_GROUP, WERR_INVALID_PARAM },
+ { sd_sacl, SECINFO_OWNER, WERR_INVALID_PARAMETER },
+ { sd_sacl, SECINFO_GROUP, WERR_INVALID_PARAMETER },
{ sd_sacl, SECINFO_DACL, WERR_OK,
false, (secinfo_verify_fn)_test_sacl_trustee_present },
{ sd_sacl, SECINFO_SACL, WERR_OK,
const char *errmsg_nonexisting = "expected WERR_FILE_NOT_FOUND for nonexisting value";
if (valuename == NULL) {
- expected_error = WERR_INVALID_PARAM;
- errmsg_nonexisting = "expected WERR_INVALID_PARAM for NULL valuename";
+ expected_error = WERR_INVALID_PARAMETER;
+ errmsg_nonexisting = "expected WERR_INVALID_PARAMETER for NULL valuename";
}
ZERO_STRUCT(r);
r.in.value_name = &value_name;
torture_assert_ntstatus_ok(tctx, dcerpc_winreg_QueryValue_r(b, tctx, &r), "QueryValue failed");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
- "expected WERR_INVALID_PARAM for NULL winreg_String.name");
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
+ "expected WERR_INVALID_PARAMETER for NULL winreg_String.name");
init_winreg_String(&value_name, valuename);
r.in.value_name = &value_name;
torture_assert_ntstatus_ok(tctx, dcerpc_winreg_QueryValue_r(b, tctx, &r),
"QueryValue failed");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
- "expected WERR_INVALID_PARAM for missing type length and size");
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
+ "expected WERR_INVALID_PARAMETER for missing type length and size");
r.in.type = &type;
r.out.type = &type;
torture_assert_ntstatus_ok(tctx, dcerpc_winreg_QueryValue_r(b, tctx, &r),
"QueryValue failed");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
- "expected WERR_INVALID_PARAM for missing length and size");
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
+ "expected WERR_INVALID_PARAMETER for missing length and size");
r.in.data_length = &data_length;
r.out.data_length = &data_length;
torture_assert_ntstatus_ok(tctx, dcerpc_winreg_QueryValue_r(b, tctx, &r),
"QueryValue failed");
- torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
- "expected WERR_INVALID_PARAM for missing size");
+ torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAMETER,
+ "expected WERR_INVALID_PARAMETER for missing size");
r.in.data_size = &data_size;
r.out.data_size = &data_size;
torture_assert_werr_equal(tctx,
r.out.result,
- WERR_INVALID_PARAM,
+ WERR_INVALID_PARAMETER,
"UnRegister failed");
return true;
.ip_address = "",
.client_computer_name = "",
.expected_status = NT_STATUS_OK,
- .expected_result = WERR_INVALID_PARAM
+ .expected_result = WERR_INVALID_PARAMETER
},{
.version = WITNESS_V1,
.net_name = NULL,
.ip_address = NULL,
.client_computer_name = lpcfg_netbios_name(tctx->lp_ctx),
.expected_status = NT_STATUS_OK,
- .expected_result = WERR_INVALID_PARAM
+ .expected_result = WERR_INVALID_PARAMETER
},{
.version = WITNESS_V2,
.net_name = NULL,
.ip_address = NULL,
.client_computer_name = lpcfg_netbios_name(tctx->lp_ctx),
.expected_status = NT_STATUS_OK,
- .expected_result = WERR_INVALID_PARAM
+ .expected_result = WERR_INVALID_PARAMETER
}
};
.ip_address = "",
.client_computer_name = "",
.expected_status = NT_STATUS_OK,
- .expected_result = WERR_INVALID_PARAM
+ .expected_result = WERR_INVALID_PARAMETER
},{
.version = WITNESS_V2,
.net_name = NULL,
.ip_address = NULL,
.client_computer_name = lpcfg_netbios_name(tctx->lp_ctx),
.expected_status = NT_STATUS_OK,
- .expected_result = WERR_INVALID_PARAM
+ .expected_result = WERR_INVALID_PARAMETER
},{
.version = WITNESS_V1,
.net_name = NULL,
.ip_address = NULL,
.client_computer_name = lpcfg_netbios_name(tctx->lp_ctx),
.expected_status = NT_STATUS_OK,
- .expected_result = WERR_INVALID_PARAM
+ .expected_result = WERR_INVALID_PARAMETER
}
};
torture_assert_ntstatus_ok(tctx, status,
"NetrWkstaTransportAdd failed");
torture_assert_werr_equal(tctx, r.out.result,
- WERR_INVALID_PARAM,
+ WERR_INVALID_PARAMETER,
"NetrWkstaTransportAdd level 0 failed");
return true;
{ NULL, 0, WERR_NO_SUCH_LOGON_SESSION },
{ NULL, 1, WERR_NO_SUCH_LOGON_SESSION },
{ NULL, 1101, WERR_OK },
- { dom, 0, WERR_INVALID_PARAM },
- { dom, 1, WERR_INVALID_PARAM },
- { dom, 1101, WERR_INVALID_PARAM },
- { user, 0, WERR_INVALID_PARAM },
- { user, 1, WERR_INVALID_PARAM },
- { user, 1101, WERR_INVALID_PARAM },
+ { dom, 0, WERR_INVALID_PARAMETER },
+ { dom, 1, WERR_INVALID_PARAMETER },
+ { dom, 1101, WERR_INVALID_PARAMETER },
+ { user, 0, WERR_INVALID_PARAMETER },
+ { user, 1, WERR_INVALID_PARAMETER },
+ { user, 1101, WERR_INVALID_PARAMETER },
};
for (i=0; i<ARRAY_SIZE(tests); i++) {