expected_str 477 source4/torture/rpc/drsuapi_cracknames.c const char *expected_str; expected_str 488 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name, expected_str 495 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name, expected_str 508 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name, expected_str 516 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name, expected_str 523 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_name, expected_str 530 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name, expected_str 537 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_ex_name, expected_str 544 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name, expected_str 553 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_name, expected_str 562 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_ex_name, expected_str 582 source4/torture/rpc/drsuapi_cracknames.c .expected_str = nt4_domain, expected_str 590 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "%s/", dns_domain), expected_str 598 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "%s\n", dns_domain), expected_str 615 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name, expected_str 623 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc), expected_str 631 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.site_dn, expected_str 639 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.computer_dn, expected_str 654 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.server_dn, expected_str 662 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.ntds_dn, expected_str 709 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "CN=krbtgt,CN=Users,%s", realm_dn_str), expected_str 868 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "CN=Builtin,%s", realm_dn_str), expected_str 906 source4/torture/rpc/drsuapi_cracknames.c .expected_str = realm_dn_str, expected_str 914 source4/torture/rpc/drsuapi_cracknames.c .expected_str = nt4_domain, expected_str 981 source4/torture/rpc/drsuapi_cracknames.c } else if (crack[i].expected_str expected_str 983 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str) != 0)) { expected_str 985 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str) != 0) { expected_str 988 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str, comment); expected_str 993 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str, comment); expected_str 1000 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str, comment);