canonical_name   1117 source3/winbindd/idmap_adex/provider_unified.c 	char *canonical_name = NULL;
canonical_name   1149 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = gc_sid_to_name(&sid, &canonical_name, &type);
canonical_name   1152 source3/winbindd/idmap_adex/provider_unified.c 	*name = talloc_strdup(mem_ctx, canonical_name);
canonical_name   1163 source3/winbindd/idmap_adex/provider_unified.c 	SAFE_FREE(canonical_name);
canonical_name    911 source4/dsdb/samdb/cracknames.c 			const char *canonical_name = NULL; /* Not required, but we get warnings... */
canonical_name    916 source4/dsdb/samdb/cracknames.c 					canonical_name = ldb_dn_canonical_string(mem_ctx, result_res[i]->dn);
canonical_name    919 source4/dsdb/samdb/cracknames.c 					canonical_name = ldb_dn_canonical_ex_string(mem_ctx, result_res[i]->dn);
canonical_name    922 source4/dsdb/samdb/cracknames.c 				if (strcasecmp_m(canonical_name, name) == 0) {
canonical_name    238 source4/torture/rpc/drsuapi_cracknames.c 	const char *canonical_name;
canonical_name    459 source4/torture/rpc/drsuapi_cracknames.c 	canonical_name = ldb_dn_canonical_string(mem_ctx, FQDN_1779_dn);
canonical_name    523 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = canonical_name,
canonical_name    529 source4/torture/rpc/drsuapi_cracknames.c 				.str = canonical_name,
canonical_name    553 source4/torture/rpc/drsuapi_cracknames.c 				.expected_str = canonical_name,