Home | History | Annotate | Download | only in wifi

Lines Matching defs:Ent

32 Ent = WifiEnums.Enterprise
78 Ent.EAP: EAP.PEAP,
79 Ent.CA_CERT: self.ca_cert,
80 Ent.IDENTITY: self.eap_identity,
81 Ent.PASSWORD: self.eap_password,
82 Ent.PHASE2: EapPhase2.MSCHAPV2,
88 Ent.EAP: EAP.TLS,
89 Ent.CA_CERT: self.ca_cert,
91 Ent.CLIENT_CERT: self.client_cert,
92 Ent.PRIVATE_KEY_ID: self.client_key,
93 Ent.IDENTITY: self.eap_identity,
96 Ent.EAP: EAP.TTLS,
97 Ent.CA_CERT: self.ca_cert,
98 Ent.IDENTITY: self.eap_identity,
99 Ent.PASSWORD: self.eap_password,
100 Ent.PHASE2: EapPhase2.MSCHAPV2,
104 Ent.EAP: EAP.PWD,
105 Ent.IDENTITY: self.eap_identity,
106 Ent.PASSWORD: self.eap_password,
110 Ent.EAP: EAP.SIM,
114 Ent.EAP: EAP.AKA,
118 Ent.EAP: EAP.AKA_PRIME,
124 Ent.FQDN: self.fqdn,
125 Ent.FRIENDLY_NAME: self.provider_friendly_name,
126 Ent.REALM: self.realm,
127 Ent.CA_CERT: self.passpoint_ca_cert
130 self.config_passpoint[Ent.PLMN] = self.plmn
132 self.config_passpoint[Ent.ROAMING_IDS] = self.roaming_consortium_ids
137 self.config_passpoint_tls[Ent.CLIENT_CERT] = self.passpoint_client_cert
138 self.config_passpoint_tls[Ent.PRIVATE_KEY_ID] = self.passpoint_client_key
195 if Ent.FQDN in config and phase2_type == EapPhase2.GTC:
198 c[Ent.PHASE2] = phase2_type
251 if c[Ent.EAP] == EAP.TLS and k == Ent.IDENTITY:
272 Ent.CLIENT_CERT: self.invalid_client_cert,
273 Ent.CA_CERT: self.invalid_ca_cert,
274 Ent.PRIVATE_KEY_ID: self.invalid_client_key,
275 Ent.IDENTITY: "fake_identity",
276 Ent.PASSWORD: "wrong_password"
290 Ent.CLIENT_CERT: self.invalid_client_cert,
291 Ent.CA_CERT: self.invalid_ca_cert,
292 Ent.PRIVATE_KEY_ID: self.invalid_client_key,
293 Ent.IDENTITY: "fake_identity",
294 Ent.PASSWORD: "wrong_password",
295 Ent.FQDN: "fake_fqdn",
296 Ent.REALM: "where_no_one_has_gone_before",
297 Ent.PLMN: "fake_plmn",
298 Ent.ROAMING_IDS: [1234567890, 9876543210]
315 eap_name = config[Ent.EAP].name
321 if Ent.PHASE2 in config:
322 name += "-{}".format(config[Ent.PHASE2].name)