if ( lp_security() == SEC_ADS && !*lp_realm()) {
d_fprintf(stderr, _("realm must be set in in %s for ADS "
"join to succeed.\n"), get_dyn_CONFIGFILE());
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
return WERR_OK;
else if ( !strncasecmp_m(argv[i], "createcomputer", strlen("createcomputer")) ) {
if ( (create_in_ou = get_string_param(argv[i])) == NULL ) {
d_fprintf(stderr, _("Please supply a valid OU path.\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto fail;
}
}
else if ( !strncasecmp_m(argv[i], "osName", strlen("osName")) ) {
if ( (os_name = get_string_param(argv[i])) == NULL ) {
d_fprintf(stderr, _("Please supply a operating system name.\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto fail;
}
}
else if ( !strncasecmp_m(argv[i], "osVer", strlen("osVer")) ) {
if ( (os_version = get_string_param(argv[i])) == NULL ) {
d_fprintf(stderr, _("Please supply a valid operating system version.\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto fail;
}
}
else if ( !strncasecmp_m(argv[i], "osServicePack", strlen("osServicePack")) ) {
if ( (os_servicepack = get_string_param(argv[i])) == NULL ) {
d_fprintf(stderr, _("Please supply a valid servicepack identifier.\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto fail;
}
}
else if ( !strncasecmp_m(argv[i], "machinepass", strlen("machinepass")) ) {
if ( (machine_password = get_string_param(argv[i])) == NULL ) {
d_fprintf(stderr, _("Please supply a valid password to set as trust account password.\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto fail;
}
}
if (!*domain) {
d_fprintf(stderr, _("Please supply a valid domain name\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto fail;
}
TALLOC_CTX *tmp_ctx = talloc_stackframe();
if ((hive == NULL) || (subkeyname == NULL)) {
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto done;
}
TALLOC_CTX *tmp_ctx = talloc_stackframe();
if ((path == NULL) || (key == NULL)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
werr = open_hive(tmp_ctx, path, desired_access, &hive, &subkey_name);
if (sd == NULL) {
d_fprintf(stderr, _("internal error: invalid argument\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto done;
}
if (strlen(keyname) == 0) {
d_fprintf(stderr, _("error: zero length key name given\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto done;
}
if (strlen(keyname) == 0) {
d_fprintf(stderr, _("error: zero length key name given\n"));
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto done;
}
WERROR werr;
if (parent == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
werr = reg_setvalue(parent, name, value);
WERROR werr;
if (parent == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
werr = reg_deletevalue(parent, name);
const char *tmp_subkeyname;
if ((path == NULL) || (hivename == NULL) || (subkeyname == NULL)) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (strlen(path) == 0) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (strchr(path, '\\') == NULL) {
*/
if (!net_conf_param_valid(service_name, param_name, valstr)) {
- werr = WERR_INVALID_PARAM;
+ werr = WERR_INVALID_PARAMETER;
goto error;
}
struct dcerpc_binding_handle *b = ctx->pipe_hnd->binding_handle;
if (parent == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
ZERO_STRUCT(valuename);
struct dcerpc_binding_handle *b = ctx->pipe_hnd->binding_handle;
if (parent == NULL) {
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
ZERO_STRUCT(valuename);