diff --git a/kcm/kcm.cpp b/kcm/kcm.cpp --- a/kcm/kcm.cpp +++ b/kcm/kcm.cpp @@ -106,7 +106,6 @@ // Also check if the connection type is supported by KCM const NetworkManager::ConnectionSettings::ConnectionType type = activeConnection->type(); if (UiUtils::isConnectionTypeSupported(type)) { - loadConnectionSettings(activeConnection->connection()->settings()); QMetaObject::invokeMethod(rootItem, "selectConnection", Q_ARG(QVariant, activeConnection->id()), Q_ARG(QVariant, activeConnection->connection()->path())); } } else { @@ -144,7 +143,6 @@ Q_FOREACH (const NetworkManager::Connection::Ptr &connection, connectionList) { const NetworkManager::ConnectionSettings::ConnectionType type = connection->settings()->connectionType(); if (UiUtils::isConnectionTypeSupported(type)) { - loadConnectionSettings(connection->settings()); QMetaObject::invokeMethod(rootItem, "selectConnection", Q_ARG(QVariant, connection->settings()->id()), Q_ARG(QVariant, connection->path())); break; } diff --git a/libs/editor/settings/security802-1x.cpp b/libs/editor/settings/security802-1x.cpp --- a/libs/editor/settings/security802-1x.cpp +++ b/libs/editor/settings/security802-1x.cpp @@ -146,6 +146,7 @@ QStringList servers; m_ui->auth->setCurrentIndex(m_ui->auth->findData(NetworkManager::Security8021xSetting::EapMethodTls)); m_ui->tlsIdentity->setText(securitySetting->identity()); + m_ui->tlsDomain->setText(securitySetting->domainSuffixMatch()); m_ui->tlsUserCert->setUrl(QUrl::fromLocalFile(securitySetting->clientCertificate())); m_ui->tlsCACert->setUrl(QUrl::fromLocalFile(securitySetting->caCertificate())); m_ui->leTlsSubjectMatch->setText(securitySetting->subjectMatch()); @@ -196,6 +197,7 @@ } else if (eapMethods.contains(NetworkManager::Security8021xSetting::EapMethodTtls)) { m_ui->auth->setCurrentIndex(m_ui->auth->findData(NetworkManager::Security8021xSetting::EapMethodTtls)); m_ui->ttlsAnonIdentity->setText(securitySetting->anonymousIdentity()); + m_ui->ttlsDomain->setText(securitySetting->domainSuffixMatch()); m_ui->ttlsCACert->setUrl(QUrl::fromLocalFile(securitySetting->caCertificate())); if (phase2AuthMethod == NetworkManager::Security8021xSetting::AuthMethodPap) { m_ui->ttlsInnerAuth->setCurrentIndex(0); @@ -217,6 +219,7 @@ } else if (eapMethods.contains(NetworkManager::Security8021xSetting::EapMethodPeap)) { m_ui->auth->setCurrentIndex(m_ui->auth->findData(NetworkManager::Security8021xSetting::EapMethodPeap)); m_ui->peapAnonIdentity->setText(securitySetting->anonymousIdentity()); + m_ui->peapDomain->setText(securitySetting->domainSuffixMatch()); m_ui->peapCACert->setUrl(QUrl::fromLocalFile(securitySetting->caCertificate())); m_ui->peapVersion->setCurrentIndex(securitySetting->phase1PeapVersion() + 1); if (phase2AuthMethod == NetworkManager::Security8021xSetting::AuthMethodMschapv2) { @@ -298,6 +301,10 @@ setting.setIdentity(m_ui->tlsIdentity->text()); } + if (!m_ui->tlsDomain->text().isEmpty()) { + setting.setDomainSuffixMatch(m_ui->tlsDomain->text()); + } + if (m_ui->tlsUserCert->url().isValid()) { setting.setClientCertificate(m_ui->tlsUserCert->url().toString().toUtf8().append('\0')); } @@ -400,6 +407,10 @@ setting.setAnonymousIdentity(m_ui->ttlsAnonIdentity->text()); } + if (!m_ui->ttlsDomain->text().isEmpty()) { + setting.setDomainSuffixMatch(m_ui->ttlsDomain->text()); + } + if (m_ui->ttlsCACert->url().isValid()) { setting.setCaCertificate(m_ui->ttlsCACert->url().toString().toUtf8().append('\0')); } @@ -435,6 +446,10 @@ setting.setAnonymousIdentity(m_ui->peapAnonIdentity->text()); } + if (!m_ui->peapDomain->text().isEmpty()) { + setting.setDomainSuffixMatch(m_ui->peapDomain->text()); + } + if (m_ui->peapCACert->url().isValid()) { setting.setCaCertificate(m_ui->peapCACert->url().toString().toUtf8().append('\0')); } diff --git a/libs/editor/settings/ui/802-1x.ui b/libs/editor/settings/ui/802-1x.ui --- a/libs/editor/settings/ui/802-1x.ui +++ b/libs/editor/settings/ui/802-1x.ui @@ -120,6 +120,16 @@ + + + Domain: + + + + + + + User certificate: @@ -129,14 +139,14 @@ - + *.der *.pem *.crt *.cer - + CA certificate: @@ -146,14 +156,14 @@ - + *.der *.pem *.crt *.cer - + Subject match: @@ -163,14 +173,14 @@ - + - + Alternative subject matches: @@ -180,7 +190,7 @@ - + @@ -194,7 +204,7 @@ - + Connect to these servers: @@ -204,7 +214,7 @@ - + @@ -218,7 +228,7 @@ - + Private key: @@ -228,14 +238,14 @@ - + *.der *.pem *.p12 *.key - + Private key password: @@ -245,7 +255,7 @@ - + true @@ -432,7 +442,7 @@ - + CA certificate: @@ -442,14 +452,14 @@ - + *.der *.pem *.crt *.cer - + Inner authentication: @@ -459,7 +469,7 @@ - + @@ -489,7 +499,7 @@ - + Username: @@ -499,10 +509,10 @@ - + - + Password: @@ -512,18 +522,28 @@ - + true + + + + Domain: + + + + + + - + Anonymous identity: @@ -533,10 +553,10 @@ - + - + CA certificate: @@ -546,14 +566,14 @@ - + *.der *.pem *.crt *.cer - + PEAP version: @@ -563,7 +583,7 @@ - + @@ -588,7 +608,7 @@ - + Inner authentication: @@ -598,7 +618,7 @@ - + @@ -623,7 +643,7 @@ - + Username: @@ -633,10 +653,10 @@ - + - + Password: @@ -646,13 +666,23 @@ - + true + + + + Domain: + + + + + + @@ -686,6 +716,7 @@ md5UserName md5Password tlsIdentity + tlsDomain tlsUserCert tlsCACert leTlsSubjectMatch @@ -705,11 +736,13 @@ fastUsername fastPassword ttlsAnonIdentity + ttlsDomain ttlsCACert ttlsInnerAuth ttlsUsername ttlsPassword peapAnonIdentity + peapDomain peapCACert peapVersion peapInnerAuth