Home
last modified time | relevance | path

Searched refs:root (Results 1 – 25 of 27) sorted by relevance

12

/hostap-latest/src/utils/
Dxml-utils.c16 xml_node_t *root, char *uri) in get_node_uri_iter() argument
26 node = root; in get_node_uri_iter()
46 xml_node_t * get_node_uri(struct xml_node_ctx *ctx, xml_node_t *root, in get_node_uri() argument
56 node = get_node_uri_iter(ctx, root, search); in get_node_uri()
64 xml_node_t *root, const char *path) in get_node_iter() argument
74 xml_node_for_each_child(ctx, node, root) { in get_node_iter()
89 xml_node_t * get_node(struct xml_node_ctx *ctx, xml_node_t *root, in get_node() argument
99 node = get_node_iter(ctx, root, search); in get_node()
106 xml_node_t * get_child_node(struct xml_node_ctx *ctx, xml_node_t *root, in get_child_node() argument
112 xml_node_for_each_child(ctx, node, root) { in get_child_node()
[all …]
Djson.c222 struct json_token *root = NULL, *curr_token = NULL, *token = NULL; in json_parse() local
240 if (!root) in json_parse()
241 root = token; in json_parse()
462 if (!root) in json_parse()
463 root = token; in json_parse()
468 if (json_check_tree_state(root) < 0) { in json_parse()
473 return root; in json_parse()
476 json_free(root); in json_parse()
596 void json_print_tree(struct json_token *root, char *buf, size_t buflen) in json_print_tree() argument
599 json_print_token(root, 1, buf, buflen); in json_print_tree()
Dxml-utils.h82 xml_node_t * get_node_uri(struct xml_node_ctx *ctx, xml_node_t *root,
84 xml_node_t * get_node(struct xml_node_ctx *ctx, xml_node_t *root,
86 xml_node_t * get_child_node(struct xml_node_ctx *ctx, xml_node_t *root,
Dutils_module_tests.c892 struct json_token *root; in json_tests() local
901 root = json_parse(test->json, os_strlen(test->json)); in json_tests()
902 if ((root && !test->tree) || (!root && test->tree)) { in json_tests()
905 } else if (root) { in json_tests()
906 json_print_tree(root, buf, sizeof(buf)); in json_tests()
914 json_free(root); in json_tests()
Djson.h42 void json_print_tree(struct json_token *root, char *buf, size_t buflen);
/hostap-latest/tests/fuzzing/json/
Djson.c17 struct json_token *root; in LLVMFuzzerTestOneInput() local
23 root = json_parse((const char *) data, size); in LLVMFuzzerTestOneInput()
24 if (!root) { in LLVMFuzzerTestOneInput()
31 json_print_tree(root, txt, buflen); in LLVMFuzzerTestOneInput()
35 json_free(root); in LLVMFuzzerTestOneInput()
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml33 to be run with root privileges.</para>
38 can be run as non-root user. Privilege separation restricts the effects
44 privileges (usually, root user). It opens a UNIX domain socket for each
48 a non-root user (e.g., all standard users on a laptop or as a special
69 chown root:wpapriv /var/run/wpa_priv
73 <para>Start <command>wpa_priv</command> as root (e.g., from system
81 <para>Run <command>wpa_supplicant</command> as non-root with a user
Dwpa_cli.sgml53 allow non-root user access (ctrl_interface GROUP= parameter in the
/hostap-latest/tests/hwsim/vm/
Dvm-run.sh192 -fsdev local,security_model=none,id=fsdev-root,path=/$ROTAG \
193 -device virtio-9p-pci,id=fs-root,fsdev=fsdev-root,mount_tag=/dev/root \
Dinside.sh81 root:x:0:0:root:/tmp:/bin/bash
DREADME32 your system's root filesystem (read-only) inside the VM. The options you
/hostap-latest/src/common/
Ddpp_reconfig.c450 struct json_token *root = NULL, *own_root = NULL, *token; in dpp_reconfig_auth_req_rx() local
497 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_req_rx()
499 if (!root || !own_root || in dpp_reconfig_auth_req_rx()
500 !dpp_connector_match_groups(own_root, root, true)) { in dpp_reconfig_auth_req_rx()
506 token = json_get_member(root, "expiry"); in dpp_reconfig_auth_req_rx()
514 token = json_get_member(root, "netAccessKey"); in dpp_reconfig_auth_req_rx()
561 json_free(root); in dpp_reconfig_auth_req_rx()
675 struct json_token *root = NULL, *token, *conn_status_json = NULL; in dpp_reconfig_auth_resp_rx() local
760 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_resp_rx()
761 if (!root) { in dpp_reconfig_auth_resp_rx()
[all …]
Ddpp.c2285 struct json_token *root = NULL, *token; in dpp_conf_req_rx() local
2409 root = json_parse((const char *) config_attr, config_attr_len); in dpp_conf_req_rx()
2410 if (!root) { in dpp_conf_req_rx()
2415 token = json_get_member(root, "name"); in dpp_conf_req_rx()
2424 token = json_get_member(root, "wi-fi_tech"); in dpp_conf_req_rx()
2437 token = json_get_member(root, "netRole"); in dpp_conf_req_rx()
2457 token = json_get_member(root, "mudurl"); in dpp_conf_req_rx()
2466 token = json_get_member(root, "bandSupport"); in dpp_conf_req_rx()
2506 cert_req = json_get_member_base64(root, "pkcs10"); in dpp_conf_req_rx()
2543 json_free(root); in dpp_conf_req_rx()
[all …]
Ddpp_crypto.c612 struct json_token *root, *token; in dpp_parse_jws_prot_hdr() local
615 root = json_parse((const char *) prot_hdr, prot_hdr_len); in dpp_parse_jws_prot_hdr()
616 if (!root) { in dpp_parse_jws_prot_hdr()
622 if (root->type != JSON_OBJECT) { in dpp_parse_jws_prot_hdr()
628 token = json_get_member(root, "typ"); in dpp_parse_jws_prot_hdr()
642 token = json_get_member(root, "alg"); in dpp_parse_jws_prot_hdr()
672 kid = json_get_member_base64url(root, "kid"); in dpp_parse_jws_prot_hdr()
681 json_free(root); in dpp_parse_jws_prot_hdr()
/hostap-latest/wpadebug/
DREADME47 NOTE: Following steps enable any app on the system to get root access!
56 adb root
74 adb root
/hostap-latest/hs20/server/
Dsql-example.txt4 …xample.com','trust_root_cert_url','https://osu-server.osu.example.com/hs20/files/spp-root-ca.der');
6 …le.com','aaa_trust_root_cert_url','https://osu-server.osu.example.com/hs20/files/aaa-root-ca.der');
Dhs20-osu-server.txt40 Select a location for the installation root directory. The example here
146 # Note: Install AAA server key/certificate and root CA in Key directory
239 "SSLVerifyClient optional" and configure the trust root CA(s) for the
/hostap-latest/hs20/server/ca/
Dsetup.sh86 cat openssl-root.cnf | sed "s/@PASSWORD@/$PASS/" \
87 > my-openssl-root.cnf
98 cat my-openssl-root.cnf | sed "s/#@CN@/commonName_default = $CNR/" > openssl.cnf.tmp
Dclean.sh12 rm -f my-openssl.cnf my-openssl-root.cnf
/hostap-latest/wpa_supplicant/dbus/
Dfi.w1.wpa_supplicant1.service.in4 User=root
/hostap-latest/tests/hwsim/auth_serv/
Dica-generate.sh17 cat iCA-server/cacert.pem ca.pem > iCA-server/ca-and-root.pem
32 cat iCA-user/cacert.pem ca.pem > iCA-user/ca-and-root.pem
/hostap-latest/wpa_supplicant/
DREADME291 build time configuration file, .config, in the wpa_supplicant root
379 # install binaries (this may need root privileges)
700 non-root user access (ctrl_interface_group in the configuration
919 To minimize the size of code that needs to be run with root privileges
924 unprivileged process (wpa_supplicant) that can be run as non-root
938 wpa_priv needs to be run with network admin privileges (usually, root
942 wpa_supplicant can be run as a non-root user (e.g., all standard users
954 chown root:wpapriv /var/run/wpa_priv
956 - start wpa_priv as root (e.g., from system startup scripts) with the
959 - run wpa_supplicant as non-root with a user that is in wpapriv group:
[all …]
DREADME-Windows.txt117 # go to the root directory of wpa_supplicant source code
256 The root of wpa_supplicant configuration in registry is
DREADME-HS20681 ca_cert: from the downloaded trust root based on PPS information
/hostap-latest/tests/hwsim/
DREADME94 Some parts of the testing process requires root privileges. The test

12