if (parent == NULL) {
DEBUG(0, ("Invalid parent key specified for open of '%s'\n",
name));
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
}
if (parent->context->ops->open_key == NULL) {
uint32_t *type, DATA_BLOB *data)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (key->context->ops->enum_value == NULL)
return WERR_NOT_SUPPORTED;
uint32_t *max_valbufsize)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (key->context->ops->get_key_info == NULL)
return WERR_NOT_SUPPORTED;
NTTIME *last_changed_time)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (key->context->ops->enum_key == NULL)
return WERR_NOT_SUPPORTED;
DATA_BLOB *data)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (key->context->ops->get_value == NULL)
return WERR_NOT_SUPPORTED;
const char *name)
{
if (parent == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (parent->context->ops->delete_key == NULL)
return WERR_NOT_SUPPORTED;
struct registry_key **newkey)
{
if (parent == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (parent->context->ops->create_key == NULL) {
DEBUG(1, ("Backend '%s' doesn't support method add_key\n",
uint32_t type, const DATA_BLOB data)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
/* A 'real' set function has preference */
if (key->context->ops->set_value == NULL) {
struct security_descriptor **secdesc)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
/* A 'real' set function has preference */
if (key->context->ops->get_sec_desc == NULL)
const char *valname)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (key->context->ops->delete_value == NULL)
return WERR_NOT_SUPPORTED;
_PUBLIC_ WERROR reg_key_flush(struct registry_key *key)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (key->context->ops->flush_key == NULL)
return WERR_NOT_SUPPORTED;
const struct security_descriptor *security)
{
if (key == NULL)
- return WERR_INVALID_PARAM;
+ return WERR_INVALID_PARAMETER;
if (key->context->ops->set_sec_desc == NULL)
return WERR_NOT_SUPPORTED;