expected_str      477 source4/torture/rpc/drsuapi_cracknames.c 			const char *expected_str;
expected_str      488 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = FQDN_1779_name,
expected_str      495 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = FQDN_1779_name,
expected_str      508 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = FQDN_1779_name,
expected_str      516 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = FQDN_1779_name,
expected_str      523 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = canonical_name,
expected_str      530 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = FQDN_1779_name,
expected_str      537 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = canonical_ex_name,
expected_str      544 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = FQDN_1779_name,
expected_str      553 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = canonical_name,
expected_str      562 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = canonical_ex_name,
expected_str      582 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = nt4_domain,
expected_str      590 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = talloc_asprintf(mem_ctx, "%s/", dns_domain),
expected_str      598 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = talloc_asprintf(mem_ctx, "%s\n", dns_domain),
expected_str      615 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = FQDN_1779_name,
expected_str      623 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc),
expected_str      631 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = priv->dcinfo.site_dn,
expected_str      639 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = priv->dcinfo.computer_dn,
expected_str      654 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = priv->dcinfo.server_dn,
expected_str      662 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = priv->dcinfo.ntds_dn,
expected_str      709 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = talloc_asprintf(mem_ctx, "CN=krbtgt,CN=Users,%s", realm_dn_str),
expected_str      868 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = talloc_asprintf(mem_ctx, "CN=Builtin,%s", realm_dn_str),
expected_str      906 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = realm_dn_str,
expected_str      914 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = nt4_domain,
expected_str      981 source4/torture/rpc/drsuapi_cracknames.c 			} else if (crack[i].expected_str
expected_str      983 source4/torture/rpc/drsuapi_cracknames.c 					      crack[i].expected_str) != 0)) {
expected_str      985 source4/torture/rpc/drsuapi_cracknames.c 					       crack[i].expected_str) != 0) {
expected_str      988 source4/torture/rpc/drsuapi_cracknames.c 					       crack[i].expected_str, comment);
expected_str      993 source4/torture/rpc/drsuapi_cracknames.c 					       crack[i].expected_str, comment);
expected_str     1000 source4/torture/rpc/drsuapi_cracknames.c 				       crack[i].expected_str, comment);