expected_str 477 source4/torture/rpc/drsuapi_cracknames.c const char *expected_str;
expected_str 488 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name,
expected_str 495 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name,
expected_str 508 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name,
expected_str 516 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name,
expected_str 523 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_name,
expected_str 530 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name,
expected_str 537 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_ex_name,
expected_str 544 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name,
expected_str 553 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_name,
expected_str 562 source4/torture/rpc/drsuapi_cracknames.c .expected_str = canonical_ex_name,
expected_str 582 source4/torture/rpc/drsuapi_cracknames.c .expected_str = nt4_domain,
expected_str 590 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "%s/", dns_domain),
expected_str 598 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "%s\n", dns_domain),
expected_str 615 source4/torture/rpc/drsuapi_cracknames.c .expected_str = FQDN_1779_name,
expected_str 623 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc),
expected_str 631 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.site_dn,
expected_str 639 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.computer_dn,
expected_str 654 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.server_dn,
expected_str 662 source4/torture/rpc/drsuapi_cracknames.c .expected_str = priv->dcinfo.ntds_dn,
expected_str 709 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "CN=krbtgt,CN=Users,%s", realm_dn_str),
expected_str 868 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "CN=Builtin,%s", realm_dn_str),
expected_str 906 source4/torture/rpc/drsuapi_cracknames.c .expected_str = realm_dn_str,
expected_str 914 source4/torture/rpc/drsuapi_cracknames.c .expected_str = nt4_domain,
expected_str 981 source4/torture/rpc/drsuapi_cracknames.c } else if (crack[i].expected_str
expected_str 983 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str) != 0)) {
expected_str 985 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str) != 0) {
expected_str 988 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str, comment);
expected_str 993 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str, comment);
expected_str 1000 source4/torture/rpc/drsuapi_cracknames.c crack[i].expected_str, comment);