canonical_name 1117 source3/winbindd/idmap_adex/provider_unified.c char *canonical_name = NULL; canonical_name 1149 source3/winbindd/idmap_adex/provider_unified.c nt_status = gc_sid_to_name(&sid, &canonical_name, &type); canonical_name 1152 source3/winbindd/idmap_adex/provider_unified.c *name = talloc_strdup(mem_ctx, canonical_name); canonical_name 1163 source3/winbindd/idmap_adex/provider_unified.c SAFE_FREE(canonical_name); canonical_name 911 source4/dsdb/samdb/cracknames.c const char *canonical_name = NULL; /* Not required, but we get warnings... */ canonical_name 916 source4/dsdb/samdb/cracknames.c canonical_name = ldb_dn_canonical_string(mem_ctx, result_res[i]->dn); canonical_name 919 source4/dsdb/samdb/cracknames.c canonical_name = ldb_dn_canonical_ex_string(mem_ctx, result_res[i]->dn); canonical_name 922 source4/dsdb/samdb/cracknames.c if (strcasecmp_m(canonical_name, name) == 0) { canonical_name 238 source4/torture/rpc/drsuapi_cracknames.c const char *canonical_name; canonical_name 459 source4/torture/rpc/drsuapi_cracknames.c canonical_name = ldb_dn_canonical_string(mem_ctx, FQDN_1779_dn); canonical_name 523 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_name, canonical_name 529 source4/torture/rpc/drsuapi_cracknames.c .str = canonical_name, canonical_name 553 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_name,