res2              283 source3/lib/ldb/ldb_tdb/ldb_search.c 	struct ldb_message **res2;
res2              292 source3/lib/ldb/ldb_tdb/ldb_search.c 	res2 = talloc_realloc(mem_ctx, *res, struct ldb_message *, (*count)+2);
res2              293 source3/lib/ldb/ldb_tdb/ldb_search.c 	if (!res2) {
res2              298 source3/lib/ldb/ldb_tdb/ldb_search.c 	(*res) = res2;
res2             1079 source3/libads/ldap.c 		LDAPMessage *res2 = NULL;
res2             1084 source3/libads/ldap.c 					      attrs, args, &res2, &count, &cookie);
res2             1090 source3/libads/ldap.c 		for (msg = ads_first_message(ads, res2); msg; msg = next) {
res2              316 source3/torture/masktest.c 	char *res2;
res2              343 source3/torture/masktest.c 	res2 = reg_test(cli, mask, long_name, short_name);
res2              346 source3/torture/masktest.c 	    ((strcmp(res1, res2) && !ignore_dot_errors) ||
res2              347 source3/torture/masktest.c 	     (strcmp(res1+2, res2+2) && ignore_dot_errors))) {
res2              349 source3/torture/masktest.c 			 res1, res2, count, mask, file, long_name, short_name));
res2              293 source4/lib/ldb/ldb_tdb/ldb_search.c 	struct ldb_message **res2;
res2              302 source4/lib/ldb/ldb_tdb/ldb_search.c 	res2 = talloc_realloc(mem_ctx, *res, struct ldb_message *, (*count)+2);
res2              303 source4/lib/ldb/ldb_tdb/ldb_search.c 	if (!res2) {
res2              308 source4/lib/ldb/ldb_tdb/ldb_search.c 	(*res) = res2;
res2             3069 source4/lib/wmi/wmi_wrap.c   int res2 ;
res2             3112 source4/lib/wmi/wmi_wrap.c   res2 = SWIG_AsCharPtrAndSize(obj0, &buf2, NULL, &alloc2);
res2             3113 source4/lib/wmi/wmi_wrap.c   if (!SWIG_IsOK(res2)) {
res2             3114 source4/lib/wmi/wmi_wrap.c     SWIG_exception_fail(SWIG_ArgError(res2), "in method '" "WBEM_ConnectServer" "', argument " "2"" of type '" "char const *""'");
res2             1084 source4/rpc_server/netlogon/dcerpc_netlogon.c 	struct ldb_message **res1, **res2, **ref_res;
res2             1130 source4/rpc_server/netlogon/dcerpc_netlogon.c 	ret2 = gendb_search(sam_ctx, mem_ctx, NULL, &res2, attrs, "(objectClass=trustedDomain)");
res2             1150 source4/rpc_server/netlogon/dcerpc_netlogon.c 		status = fill_domain_trust_info(mem_ctx, res2[i], NULL, &info1->trusts[i], 
res2             2478 source4/rpc_server/samr/dcesrv_samr.c 			struct ldb_message **res2;
res2             2482 source4/rpc_server/samr/dcesrv_samr.c 					   &res2, attrs2);
res2             2487 source4/rpc_server/samr/dcesrv_samr.c 				samdb_result_rid_from_sid(mem_ctx, res2[0],
res2             1785 source4/torture/basic/denytest.c 		enum deny_result res, res2;
res2             1851 source4/torture/basic/denytest.c 						   &res2);
res2             1858 source4/torture/basic/denytest.c 		    res != res2) {
res2             1865 source4/torture/basic/denytest.c 			       resultstr(res2),
res2             1871 source4/torture/basic/denytest.c 		if (res != res2 ||
res2              176 source4/torture/masktest.c 	char *res2;
res2              204 source4/torture/masktest.c 	res2 = reg_test(cli, mem_ctx, mask, long_name, short_name);
res2              206 source4/torture/masktest.c 	if (showall || strcmp(res1, res2)) {
res2              208 source4/torture/masktest.c 			 res1, res2, count, mask, file, long_name, short_name);