diff --git a/kcm/kcm.cpp b/kcm/kcm.cpp
--- a/kcm/kcm.cpp
+++ b/kcm/kcm.cpp
@@ -106,7 +106,6 @@
// Also check if the connection type is supported by KCM
const NetworkManager::ConnectionSettings::ConnectionType type = activeConnection->type();
if (UiUtils::isConnectionTypeSupported(type)) {
- loadConnectionSettings(activeConnection->connection()->settings());
QMetaObject::invokeMethod(rootItem, "selectConnection", Q_ARG(QVariant, activeConnection->id()), Q_ARG(QVariant, activeConnection->connection()->path()));
}
} else {
@@ -144,7 +143,6 @@
Q_FOREACH (const NetworkManager::Connection::Ptr &connection, connectionList) {
const NetworkManager::ConnectionSettings::ConnectionType type = connection->settings()->connectionType();
if (UiUtils::isConnectionTypeSupported(type)) {
- loadConnectionSettings(connection->settings());
QMetaObject::invokeMethod(rootItem, "selectConnection", Q_ARG(QVariant, connection->settings()->id()), Q_ARG(QVariant, connection->path()));
break;
}
diff --git a/libs/editor/settings/security802-1x.cpp b/libs/editor/settings/security802-1x.cpp
--- a/libs/editor/settings/security802-1x.cpp
+++ b/libs/editor/settings/security802-1x.cpp
@@ -146,6 +146,7 @@
QStringList servers;
m_ui->auth->setCurrentIndex(m_ui->auth->findData(NetworkManager::Security8021xSetting::EapMethodTls));
m_ui->tlsIdentity->setText(securitySetting->identity());
+ m_ui->tlsDomain->setText(securitySetting->domainSuffixMatch());
m_ui->tlsUserCert->setUrl(QUrl::fromLocalFile(securitySetting->clientCertificate()));
m_ui->tlsCACert->setUrl(QUrl::fromLocalFile(securitySetting->caCertificate()));
m_ui->leTlsSubjectMatch->setText(securitySetting->subjectMatch());
@@ -196,6 +197,7 @@
} else if (eapMethods.contains(NetworkManager::Security8021xSetting::EapMethodTtls)) {
m_ui->auth->setCurrentIndex(m_ui->auth->findData(NetworkManager::Security8021xSetting::EapMethodTtls));
m_ui->ttlsAnonIdentity->setText(securitySetting->anonymousIdentity());
+ m_ui->ttlsDomain->setText(securitySetting->domainSuffixMatch());
m_ui->ttlsCACert->setUrl(QUrl::fromLocalFile(securitySetting->caCertificate()));
if (phase2AuthMethod == NetworkManager::Security8021xSetting::AuthMethodPap) {
m_ui->ttlsInnerAuth->setCurrentIndex(0);
@@ -217,6 +219,7 @@
} else if (eapMethods.contains(NetworkManager::Security8021xSetting::EapMethodPeap)) {
m_ui->auth->setCurrentIndex(m_ui->auth->findData(NetworkManager::Security8021xSetting::EapMethodPeap));
m_ui->peapAnonIdentity->setText(securitySetting->anonymousIdentity());
+ m_ui->peapDomain->setText(securitySetting->domainSuffixMatch());
m_ui->peapCACert->setUrl(QUrl::fromLocalFile(securitySetting->caCertificate()));
m_ui->peapVersion->setCurrentIndex(securitySetting->phase1PeapVersion() + 1);
if (phase2AuthMethod == NetworkManager::Security8021xSetting::AuthMethodMschapv2) {
@@ -298,6 +301,10 @@
setting.setIdentity(m_ui->tlsIdentity->text());
}
+ if (!m_ui->tlsDomain->text().isEmpty()) {
+ setting.setDomainSuffixMatch(m_ui->tlsDomain->text());
+ }
+
if (m_ui->tlsUserCert->url().isValid()) {
setting.setClientCertificate(m_ui->tlsUserCert->url().toString().toUtf8().append('\0'));
}
@@ -400,6 +407,10 @@
setting.setAnonymousIdentity(m_ui->ttlsAnonIdentity->text());
}
+ if (!m_ui->ttlsDomain->text().isEmpty()) {
+ setting.setDomainSuffixMatch(m_ui->ttlsDomain->text());
+ }
+
if (m_ui->ttlsCACert->url().isValid()) {
setting.setCaCertificate(m_ui->ttlsCACert->url().toString().toUtf8().append('\0'));
}
@@ -435,6 +446,10 @@
setting.setAnonymousIdentity(m_ui->peapAnonIdentity->text());
}
+ if (!m_ui->peapDomain->text().isEmpty()) {
+ setting.setDomainSuffixMatch(m_ui->peapDomain->text());
+ }
+
if (m_ui->peapCACert->url().isValid()) {
setting.setCaCertificate(m_ui->peapCACert->url().toString().toUtf8().append('\0'));
}
diff --git a/libs/editor/settings/ui/802-1x.ui b/libs/editor/settings/ui/802-1x.ui
--- a/libs/editor/settings/ui/802-1x.ui
+++ b/libs/editor/settings/ui/802-1x.ui
@@ -120,6 +120,16 @@
-
+
+
+ Domain:
+
+
+
+ -
+
+
+ -
User certificate:
@@ -129,14 +139,14 @@
- -
+
-
*.der *.pem *.crt *.cer
- -
+
-
CA certificate:
@@ -146,14 +156,14 @@
- -
+
-
*.der *.pem *.crt *.cer
- -
+
-
Subject match:
@@ -163,14 +173,14 @@
- -
+
-
- -
+
-
Alternative subject matches:
@@ -180,7 +190,7 @@
- -
+
-
-
@@ -194,7 +204,7 @@
- -
+
-
Connect to these servers:
@@ -204,7 +214,7 @@
- -
+
-
-
@@ -218,7 +228,7 @@
- -
+
-
Private key:
@@ -228,14 +238,14 @@
- -
+
-
*.der *.pem *.p12 *.key
- -
+
-
Private key password:
@@ -245,7 +255,7 @@
- -
+
-
true
@@ -432,7 +442,7 @@
-
- -
+
-
CA certificate:
@@ -442,14 +452,14 @@
- -
+
-
*.der *.pem *.crt *.cer
- -
+
-
Inner authentication:
@@ -459,7 +469,7 @@
- -
+
-
@@ -489,7 +499,7 @@
- -
+
-
Username:
@@ -499,10 +509,10 @@
- -
+
-
- -
+
-
Password:
@@ -512,18 +522,28 @@
- -
+
-
true
+ -
+
+
+ Domain:
+
+
+
+ -
+
+
- -
+
-
Anonymous identity:
@@ -533,10 +553,10 @@
- -
+
-
- -
+
-
CA certificate:
@@ -546,14 +566,14 @@
- -
+
-
*.der *.pem *.crt *.cer
- -
+
-
PEAP version:
@@ -563,7 +583,7 @@
- -
+
-
@@ -588,7 +608,7 @@
- -
+
-
Inner authentication:
@@ -598,7 +618,7 @@
- -
+
-
@@ -623,7 +643,7 @@
- -
+
-
Username:
@@ -633,10 +653,10 @@
- -
+
-
- -
+
-
Password:
@@ -646,13 +666,23 @@
- -
+
-
true
+ -
+
+
+ Domain:
+
+
+
+ -
+
+
@@ -686,6 +716,7 @@
md5UserName
md5Password
tlsIdentity
+ tlsDomain
tlsUserCert
tlsCACert
leTlsSubjectMatch
@@ -705,11 +736,13 @@
fastUsername
fastPassword
ttlsAnonIdentity
+ ttlsDomain
ttlsCACert
ttlsInnerAuth
ttlsUsername
ttlsPassword
peapAnonIdentity
+ peapDomain
peapCACert
peapVersion
peapInnerAuth