/hostap-latest/src/utils/ |
D | xml-utils.c | 16 xml_node_t *root, char *uri) in get_node_uri_iter() argument 26 node = root; in get_node_uri_iter() 46 xml_node_t * get_node_uri(struct xml_node_ctx *ctx, xml_node_t *root, in get_node_uri() argument 56 node = get_node_uri_iter(ctx, root, search); in get_node_uri() 64 xml_node_t *root, const char *path) in get_node_iter() argument 74 xml_node_for_each_child(ctx, node, root) { in get_node_iter() 89 xml_node_t * get_node(struct xml_node_ctx *ctx, xml_node_t *root, in get_node() argument 99 node = get_node_iter(ctx, root, search); in get_node() 106 xml_node_t * get_child_node(struct xml_node_ctx *ctx, xml_node_t *root, in get_child_node() argument 112 xml_node_for_each_child(ctx, node, root) { in get_child_node() [all …]
|
D | json.c | 222 struct json_token *root = NULL, *curr_token = NULL, *token = NULL; in json_parse() local 240 if (!root) in json_parse() 241 root = token; in json_parse() 462 if (!root) in json_parse() 463 root = token; in json_parse() 468 if (json_check_tree_state(root) < 0) { in json_parse() 473 return root; in json_parse() 476 json_free(root); in json_parse() 596 void json_print_tree(struct json_token *root, char *buf, size_t buflen) in json_print_tree() argument 599 json_print_token(root, 1, buf, buflen); in json_print_tree()
|
D | xml-utils.h | 82 xml_node_t * get_node_uri(struct xml_node_ctx *ctx, xml_node_t *root, 84 xml_node_t * get_node(struct xml_node_ctx *ctx, xml_node_t *root, 86 xml_node_t * get_child_node(struct xml_node_ctx *ctx, xml_node_t *root,
|
D | utils_module_tests.c | 892 struct json_token *root; in json_tests() local 901 root = json_parse(test->json, os_strlen(test->json)); in json_tests() 902 if ((root && !test->tree) || (!root && test->tree)) { in json_tests() 905 } else if (root) { in json_tests() 906 json_print_tree(root, buf, sizeof(buf)); in json_tests() 914 json_free(root); in json_tests()
|
D | json.h | 42 void json_print_tree(struct json_token *root, char *buf, size_t buflen);
|
/hostap-latest/tests/fuzzing/json/ |
D | json.c | 17 struct json_token *root; in LLVMFuzzerTestOneInput() local 23 root = json_parse((const char *) data, size); in LLVMFuzzerTestOneInput() 24 if (!root) { in LLVMFuzzerTestOneInput() 31 json_print_tree(root, txt, buflen); in LLVMFuzzerTestOneInput() 35 json_free(root); in LLVMFuzzerTestOneInput()
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_priv.sgml | 33 to be run with root privileges.</para> 38 can be run as non-root user. Privilege separation restricts the effects 44 privileges (usually, root user). It opens a UNIX domain socket for each 48 a non-root user (e.g., all standard users on a laptop or as a special 69 chown root:wpapriv /var/run/wpa_priv 73 <para>Start <command>wpa_priv</command> as root (e.g., from system 81 <para>Run <command>wpa_supplicant</command> as non-root with a user
|
D | wpa_cli.sgml | 53 allow non-root user access (ctrl_interface GROUP= parameter in the
|
/hostap-latest/tests/hwsim/vm/ |
D | vm-run.sh | 192 -fsdev local,security_model=none,id=fsdev-root,path=/$ROTAG \ 193 -device virtio-9p-pci,id=fs-root,fsdev=fsdev-root,mount_tag=/dev/root \
|
D | inside.sh | 81 root:x:0:0:root:/tmp:/bin/bash
|
D | README | 32 your system's root filesystem (read-only) inside the VM. The options you
|
/hostap-latest/src/common/ |
D | dpp_reconfig.c | 450 struct json_token *root = NULL, *own_root = NULL, *token; in dpp_reconfig_auth_req_rx() local 497 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_req_rx() 499 if (!root || !own_root || in dpp_reconfig_auth_req_rx() 500 !dpp_connector_match_groups(own_root, root, true)) { in dpp_reconfig_auth_req_rx() 506 token = json_get_member(root, "expiry"); in dpp_reconfig_auth_req_rx() 514 token = json_get_member(root, "netAccessKey"); in dpp_reconfig_auth_req_rx() 561 json_free(root); in dpp_reconfig_auth_req_rx() 675 struct json_token *root = NULL, *token, *conn_status_json = NULL; in dpp_reconfig_auth_resp_rx() local 760 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_resp_rx() 761 if (!root) { in dpp_reconfig_auth_resp_rx() [all …]
|
D | dpp.c | 2285 struct json_token *root = NULL, *token; in dpp_conf_req_rx() local 2409 root = json_parse((const char *) config_attr, config_attr_len); in dpp_conf_req_rx() 2410 if (!root) { in dpp_conf_req_rx() 2415 token = json_get_member(root, "name"); in dpp_conf_req_rx() 2424 token = json_get_member(root, "wi-fi_tech"); in dpp_conf_req_rx() 2437 token = json_get_member(root, "netRole"); in dpp_conf_req_rx() 2457 token = json_get_member(root, "mudurl"); in dpp_conf_req_rx() 2466 token = json_get_member(root, "bandSupport"); in dpp_conf_req_rx() 2506 cert_req = json_get_member_base64(root, "pkcs10"); in dpp_conf_req_rx() 2543 json_free(root); in dpp_conf_req_rx() [all …]
|
D | dpp_crypto.c | 612 struct json_token *root, *token; in dpp_parse_jws_prot_hdr() local 615 root = json_parse((const char *) prot_hdr, prot_hdr_len); in dpp_parse_jws_prot_hdr() 616 if (!root) { in dpp_parse_jws_prot_hdr() 622 if (root->type != JSON_OBJECT) { in dpp_parse_jws_prot_hdr() 628 token = json_get_member(root, "typ"); in dpp_parse_jws_prot_hdr() 642 token = json_get_member(root, "alg"); in dpp_parse_jws_prot_hdr() 672 kid = json_get_member_base64url(root, "kid"); in dpp_parse_jws_prot_hdr() 681 json_free(root); in dpp_parse_jws_prot_hdr()
|
/hostap-latest/wpadebug/ |
D | README | 47 NOTE: Following steps enable any app on the system to get root access! 56 adb root 74 adb root
|
/hostap-latest/hs20/server/ |
D | sql-example.txt | 4 …xample.com','trust_root_cert_url','https://osu-server.osu.example.com/hs20/files/spp-root-ca.der'); 6 …le.com','aaa_trust_root_cert_url','https://osu-server.osu.example.com/hs20/files/aaa-root-ca.der');
|
D | hs20-osu-server.txt | 40 Select a location for the installation root directory. The example here 146 # Note: Install AAA server key/certificate and root CA in Key directory 239 "SSLVerifyClient optional" and configure the trust root CA(s) for the
|
/hostap-latest/hs20/server/ca/ |
D | setup.sh | 86 cat openssl-root.cnf | sed "s/@PASSWORD@/$PASS/" \ 87 > my-openssl-root.cnf 98 cat my-openssl-root.cnf | sed "s/#@CN@/commonName_default = $CNR/" > openssl.cnf.tmp
|
D | clean.sh | 12 rm -f my-openssl.cnf my-openssl-root.cnf
|
/hostap-latest/wpa_supplicant/dbus/ |
D | fi.w1.wpa_supplicant1.service.in | 4 User=root
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | ica-generate.sh | 17 cat iCA-server/cacert.pem ca.pem > iCA-server/ca-and-root.pem 32 cat iCA-user/cacert.pem ca.pem > iCA-user/ca-and-root.pem
|
/hostap-latest/wpa_supplicant/ |
D | README | 291 build time configuration file, .config, in the wpa_supplicant root 379 # install binaries (this may need root privileges) 700 non-root user access (ctrl_interface_group in the configuration 919 To minimize the size of code that needs to be run with root privileges 924 unprivileged process (wpa_supplicant) that can be run as non-root 938 wpa_priv needs to be run with network admin privileges (usually, root 942 wpa_supplicant can be run as a non-root user (e.g., all standard users 954 chown root:wpapriv /var/run/wpa_priv 956 - start wpa_priv as root (e.g., from system startup scripts) with the 959 - run wpa_supplicant as non-root with a user that is in wpapriv group: [all …]
|
D | README-Windows.txt | 117 # go to the root directory of wpa_supplicant source code 256 The root of wpa_supplicant configuration in registry is
|
D | README-HS20 | 681 ca_cert: from the downloaded trust root based on PPS information
|
/hostap-latest/tests/hwsim/ |
D | README | 94 Some parts of the testing process requires root privileges. The test
|