Lines Matching full:bind
70 * so we bind to 0:0. in ATF_TC_BODY()
72 rc = bind(sd, (struct sockaddr *)&sin, sizeof(sin)); in ATF_TC_BODY()
92 rc = bind(sd, (struct sockaddr *)&sin, sizeof(sin)); in ATF_TC_BODY()
119 rc = bind(ss, (struct sockaddr *)&sin, sizeof(sin)); in ATF_TC_BODY()
183 rc = bind(ss, (struct sockaddr *)&sin, sizeof(sin)); in ATF_TC_BODY()
264 rc = bind(ss, (struct sockaddr *)&sin, sizeof(sin)); in ATF_TC_BODY()
334 * Bind a socket to the specified address, optionally dropping privileges and
337 * Returns true if the bind succeeded, and false if it failed with EADDRINUSE.
370 if (bind(s, sa, sa->sa_len) == 0) in child_bind()
379 if (bind(s, sa, sa->sa_len) == 0) in child_bind()
426 ATF_REQUIRE(bind(s, (struct sockaddr *)&sin, sizeof(sin)) == 0); in bind_socket()
437 ATF_REQUIRE(bind(s, (struct sockaddr *)&sin6, sizeof(sin6)) == 0); in bind_socket()
496 * Try to bind two sockets to the same address/port tuple. Under some
546 error = bind(sd[0], sinp, sinp->sa_len); in bind_connected_port_test()
547 ATF_REQUIRE_MSG(error == 0, "bind failed: %s", strerror(errno)); in bind_connected_port_test()
562 /* bind() should succeed even from an unprivileged user. */ in bind_connected_port_test()
570 * Normally bind() prevents port stealing by a different user, even when