Searched refs:wpa_priv (Results 1 – 4 of 4) sorted by relevance
9 <refentrytitle>wpa_priv</refentrytitle>13 <refname>wpa_priv</refname>20 <command>wpa_priv</command>31 <para><command>wpa_priv</command> is a privilege separation helper that35 <para>If enabled, privileged operations are done in the wpa_priv process43 <para><command>wpa_priv</command> needs to be run with network admin56 <command>wpa_priv</command> to allow users in the63 <para>Create /var/run/wpa_priv directory for UNIX domain sockets and68 mkdir /var/run/wpa_priv69 chown root:wpapriv /var/run/wpa_priv[all …]
7 FILES += wpa_priv24 …rm -f wpa_background.8 wpa_cli.8 wpa_gui.8 wpa_passphrase.8 wpa_priv.8 wpa_supplicant.8 eapol_test…
8 PROG= wpa_priv9 SRCS= os_unix.c eloop.c common.c wpa_debug.c wpabuf.c wpa_priv.c \
922 privileged operations into a separate process (wpa_priv) while leaving932 linked into a separate daemon program, wpa_priv. The unprivileged934 wrappers that communicate with the privileged wpa_priv process to935 perform the needed operations. wpa_priv can control what privileged938 wpa_priv needs to be run with network admin privileges (usually, root951 - create /var/run/wpa_priv directory for UNIX domain sockets and control953 mkdir /var/run/wpa_priv954 chown root:wpapriv /var/run/wpa_priv955 chmod 0750 /var/run/wpa_priv956 - start wpa_priv as root (e.g., from system startup scripts) with the[all …]