pub struct Setting8021x { /* private fields */ }Expand description
IEEE 802.1x Authentication Settings
§Properties
§altsubject-matches
List of strings to be matched against the altSubjectName of the certificate presented by the authentication server. If the list is empty, no verification of the server certificate’s altSubjectName is performed.
Readable | Writeable
§anonymous-identity
Anonymous identity string for EAP authentication methods. Used as the unencrypted identity with EAP types that support different tunneled identity like EAP-TTLS.
Readable | Writeable
§auth-timeout
A timeout for the authentication. Zero means the global default; if the global default is not set, the authentication timeout is 25 seconds.
Readable | Writeable
§ca-cert
Contains the CA certificate if used by the EAP method specified in the #NMSetting8021x:eap property.
Certificate data is specified using a “scheme”; three are currently supported: blob, path and pkcs#11 URL. When using the blob scheme this property should be set to the certificate’s DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string “file://” and ending with a terminating NUL byte. This property can be unset even if the EAP method supports CA certificates, but this allows man-in-the-middle attacks and is NOT recommended.
Note that enabling NMSetting8021x:system-ca-certs will override this setting to use the built-in path, if the built-in path is not a directory.
Setting this property directly is discouraged; use the nm_setting_802_1x_set_ca_cert() function instead.
Readable | Writeable
§ca-cert-password
The password used to access the CA certificate stored in #NMSetting8021x:ca-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Readable | Writeable
§ca-cert-password-flags
Flags indicating how to handle the #NMSetting8021x:ca-cert-password property.
Readable | Writeable
§ca-path
UTF-8 encoded path to a directory containing PEM or DER formatted certificates to be added to the verification chain in addition to the certificate specified in the #NMSetting8021x:ca-cert property.
If NMSetting8021x:system-ca-certs is enabled and the built-in CA path is an existing directory, then this setting is ignored.
Readable | Writeable
§client-cert
Contains the client certificate if used by the EAP method specified in the #NMSetting8021x:eap property.
Certificate data is specified using a “scheme”; two are currently supported: blob and path. When using the blob scheme (which is backwards compatible with NM 0.7.x) this property should be set to the certificate’s DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string “file://” and ending with a terminating NUL byte.
Setting this property directly is discouraged; use the nm_setting_802_1x_set_client_cert() function instead.
Readable | Writeable
§client-cert-password
The password used to access the client certificate stored in #NMSetting8021x:client-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Readable | Writeable
§client-cert-password-flags
Flags indicating how to handle the #NMSetting8021x:client-cert-password property.
Readable | Writeable
§domain-match
Constraint for server domain name. If set, this list of FQDNs is used as a match requirement for dNSName element(s) of the certificate presented by the authentication server. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using the same comparison. Multiple valid FQDNs can be passed as a “;” delimited list.
Readable | Writeable
§domain-suffix-match
Constraint for server domain name. If set, this FQDN is used as a suffix match requirement for dNSName element(s) of the certificate presented by the authentication server. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using same suffix match comparison. Since version 1.24, multiple valid FQDNs can be passed as a “;” delimited list.
Readable | Writeable
§eap
The allowed EAP method to be used when authenticating to the network with 802.1x. Valid methods are: “leap”, “md5”, “tls”, “peap”, “ttls”, “pwd”, and “fast”. Each method requires different configuration using the properties of this setting; refer to wpa_supplicant documentation for the allowed combinations.
Readable | Writeable
§identity
Identity string for EAP authentication methods. Often the user’s user or login name.
Readable | Writeable
§openssl-ciphers
Define openssl_ciphers for wpa_supplicant. Openssl sometimes moves ciphers among SECLEVELs, thus compiled-in default value in wpa_supplicant (as modified by some linux distributions) sometimes prevents to connect to old servers that do not support new protocols.
Readable | Writeable
§optional
Whether the 802.1X authentication is optional. If true, the activation
will continue even after a timeout or an authentication failure. Setting
the property to true is currently allowed only for Ethernet connections.
If set to false, the activation can continue only after a successful
authentication.
Readable | Writeable
§pac-file
UTF-8 encoded file path containing PAC for EAP-FAST.
Readable | Writeable
§password
UTF-8 encoded password used for EAP authentication methods. If both the #NMSetting8021x:password property and the #NMSetting8021x:password-raw property are specified, #NMSetting8021x:password is preferred.
Readable | Writeable
§password-flags
Flags indicating how to handle the #NMSetting8021x:password property.
Readable | Writeable
§password-raw
Password used for EAP authentication methods, given as a byte array to allow passwords in other encodings than UTF-8 to be used. If both the #NMSetting8021x:password property and the #NMSetting8021x:password-raw property are specified, #NMSetting8021x:password is preferred.
Readable | Writeable
§password-raw-flags
Flags indicating how to handle the #NMSetting8021x:password-raw property.
Readable | Writeable
§phase1-auth-flags
Specifies authentication flags to use in “phase 1” outer authentication using #NMSetting8021xAuthFlags options. The individual TLS versions can be explicitly disabled. TLS time checks can be also disabled. If a certain TLS disable flag is not set, it is up to the supplicant to allow or forbid it. The TLS options map to tls_disable_tlsv1_x and tls_disable_time_checks settings. See the wpa_supplicant documentation for more details.
Readable | Writeable
§phase1-fast-provisioning
Enables or disables in-line provisioning of EAP-FAST credentials when FAST is specified as the EAP method in the #NMSetting8021x:eap property. Recognized values are “0” (disabled), “1” (allow unauthenticated provisioning), “2” (allow authenticated provisioning), and “3” (allow both authenticated and unauthenticated provisioning). See the wpa_supplicant documentation for more details.
Readable | Writeable
§phase1-peaplabel
Forces use of the new PEAP label during key derivation. Some RADIUS servers may require forcing the new PEAP label to interoperate with PEAPv1. Set to “1” to force use of the new PEAP label. See the wpa_supplicant documentation for more details.
Readable | Writeable
§phase1-peapver
Forces which PEAP version is used when PEAP is set as the EAP method in the #NMSetting8021x:eap property. When unset, the version reported by the server will be used. Sometimes when using older RADIUS servers, it is necessary to force the client to use a particular PEAP version. To do so, this property may be set to “0” or “1” to force that specific PEAP version.
Readable | Writeable
§phase2-altsubject-matches
List of strings to be matched against the altSubjectName of the certificate presented by the authentication server during the inner “phase 2” authentication. If the list is empty, no verification of the server certificate’s altSubjectName is performed.
Readable | Writeable
§phase2-auth
Specifies the allowed “phase 2” inner authentication method when an EAP method that uses an inner TLS tunnel is specified in the #NMSetting8021x:eap property. For TTLS this property selects one of the supported non-EAP inner methods: “pap”, “chap”, “mschap”, “mschapv2” while #NMSetting8021x:phase2-autheap selects an EAP inner method. For PEAP this selects an inner EAP method, one of: “gtc”, “otp”, “md5” and “tls”. Each “phase 2” inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details. Both #NMSetting8021x:phase2-auth and #NMSetting8021x:phase2-autheap cannot be specified.
Readable | Writeable
§phase2-autheap
Specifies the allowed “phase 2” inner EAP-based authentication method when TTLS is specified in the #NMSetting8021x:eap property. Recognized EAP-based “phase 2” methods are “md5”, “mschapv2”, “otp”, “gtc”, and “tls”. Each “phase 2” inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details.
Readable | Writeable
§phase2-ca-cert
Contains the “phase 2” CA certificate if used by the EAP method specified in the #NMSetting8021x:phase2-auth or #NMSetting8021x:phase2-autheap properties.
Certificate data is specified using a “scheme”; three are currently supported: blob, path and pkcs#11 URL. When using the blob scheme this property should be set to the certificate’s DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string “file://” and ending with a terminating NUL byte. This property can be unset even if the EAP method supports CA certificates, but this allows man-in-the-middle attacks and is NOT recommended.
Note that enabling NMSetting8021x:system-ca-certs will override this setting to use the built-in path, if the built-in path is not a directory.
Setting this property directly is discouraged; use the nm_setting_802_1x_set_phase2_ca_cert() function instead.
Readable | Writeable
§phase2-ca-cert-password
The password used to access the “phase2” CA certificate stored in #NMSetting8021x:phase2-ca-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Readable | Writeable
§phase2-ca-cert-password-flags
Flags indicating how to handle the #NMSetting8021x:phase2-ca-cert-password property.
Readable | Writeable
§phase2-ca-path
UTF-8 encoded path to a directory containing PEM or DER formatted certificates to be added to the verification chain in addition to the certificate specified in the #NMSetting8021x:phase2-ca-cert property.
If NMSetting8021x:system-ca-certs is enabled and the built-in CA path is an existing directory, then this setting is ignored.
Readable | Writeable
§phase2-client-cert
Contains the “phase 2” client certificate if used by the EAP method specified in the #NMSetting8021x:phase2-auth or #NMSetting8021x:phase2-autheap properties.
Certificate data is specified using a “scheme”; two are currently supported: blob and path. When using the blob scheme (which is backwards compatible with NM 0.7.x) this property should be set to the certificate’s DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string “file://” and ending with a terminating NUL byte. This property can be unset even if the EAP method supports CA certificates, but this allows man-in-the-middle attacks and is NOT recommended.
Setting this property directly is discouraged; use the nm_setting_802_1x_set_phase2_client_cert() function instead.
Readable | Writeable
§phase2-client-cert-password
The password used to access the “phase2” client certificate stored in #NMSetting8021x:phase2-client-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Readable | Writeable
§phase2-client-cert-password-flags
Flags indicating how to handle the #NMSetting8021x:phase2-client-cert-password property.
Readable | Writeable
§phase2-domain-match
Constraint for server domain name. If set, this list of FQDNs is used as a match requirement for dNSName element(s) of the certificate presented by the authentication server during the inner “phase 2” authentication. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using the same comparison. Multiple valid FQDNs can be passed as a “;” delimited list.
Readable | Writeable
§phase2-domain-suffix-match
Constraint for server domain name. If set, this FQDN is used as a suffix match requirement for dNSName element(s) of the certificate presented by the authentication server during the inner “phase 2” authentication. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using same suffix match comparison. Since version 1.24, multiple valid FQDNs can be passed as a “;” delimited list.
Readable | Writeable
§phase2-private-key
Contains the “phase 2” inner private key when the #NMSetting8021x:phase2-auth or #NMSetting8021x:phase2-autheap property is set to “tls”.
Key data is specified using a “scheme”; two are currently supported: blob and path. When using the blob scheme and private keys, this property should be set to the key’s encrypted PEM encoded data. When using private keys with the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string “file://” and ending with a terminating NUL byte. When using PKCS#12 format private keys and the blob scheme, this property should be set to the PKCS#12 data and the #NMSetting8021x:phase2-private-key-password property must be set to password used to decrypt the PKCS#12 certificate and key. When using PKCS#12 files and the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string “file://” and ending with a terminating NUL byte, and as with the blob scheme the #NMSetting8021x:phase2-private-key-password property must be set to the password used to decode the PKCS#12 private key and certificate.
Setting this property directly is discouraged; use the nm_setting_802_1x_set_phase2_private_key() function instead.
Readable | Writeable
§phase2-private-key-password
The password used to decrypt the “phase 2” private key specified in the #NMSetting8021x:phase2-private-key property when the private key either uses the path scheme, or is a PKCS#12 format key. Setting this property directly is not generally necessary except when returning secrets to NetworkManager; it is generally set automatically when setting the private key by the nm_setting_802_1x_set_phase2_private_key() function.
Readable | Writeable
§phase2-private-key-password-flags
Flags indicating how to handle the #NMSetting8021x:phase2-private-key-password property.
Readable | Writeable
§phase2-subject-match
Substring to be matched against the subject of the certificate presented by the authentication server during the inner “phase 2” authentication. When unset, no verification of the authentication server certificate’s subject is performed. This property provides little security, if any, and should not be used.
Readable | Writeable
§pin
PIN used for EAP authentication methods.
Readable | Writeable
§pin-flags
Flags indicating how to handle the #NMSetting8021x:pin property.
Readable | Writeable
§private-key
Contains the private key when the #NMSetting8021x:eap property is set to “tls”.
Key data is specified using a “scheme”; two are currently supported: blob and path. When using the blob scheme and private keys, this property should be set to the key’s encrypted PEM encoded data. When using private keys with the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string “file://” and ending with a terminating NUL byte. When using PKCS#12 format private keys and the blob scheme, this property should be set to the PKCS#12 data and the #NMSetting8021x:private-key-password property must be set to password used to decrypt the PKCS#12 certificate and key. When using PKCS#12 files and the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string “file://” and ending with a terminating NUL byte, and as with the blob scheme the “private-key-password” property must be set to the password used to decode the PKCS#12 private key and certificate.
Setting this property directly is discouraged; use the nm_setting_802_1x_set_private_key() function instead.
WARNING: #NMSetting8021x:private-key is not a “secret” property, and thus unencrypted private key data using the BLOB scheme may be readable by unprivileged users. Private keys should always be encrypted with a private key password to prevent unauthorized access to unencrypted private key data.
Readable | Writeable
§private-key-password
The password used to decrypt the private key specified in the #NMSetting8021x:private-key property when the private key either uses the path scheme, or if the private key is a PKCS#12 format key. Setting this property directly is not generally necessary except when returning secrets to NetworkManager; it is generally set automatically when setting the private key by the nm_setting_802_1x_set_private_key() function.
Readable | Writeable
§private-key-password-flags
Flags indicating how to handle the #NMSetting8021x:private-key-password property.
Readable | Writeable
§subject-match
Substring to be matched against the subject of the certificate presented by the authentication server. When unset, no verification of the authentication server certificate’s subject is performed. This property provides little security, if any, and should not be used.
Readable | Writeable
§system-ca-certs
When true, overrides the #NMSetting8021x:ca-path and
#NMSetting8021x:phase2-ca-path properties using the system CA directory
specified at configure time with the –system-ca-path switch. The
certificates in this directory are added to the verification chain in
addition to any certificates specified by the #NMSetting8021x:ca-cert and
#NMSetting8021x:phase2-ca-cert properties. If the path provided with
–system-ca-path is rather a file name (bundle of trusted CA certificates),
it overrides #NMSetting8021x:ca-cert and #NMSetting8021x:phase2-ca-cert
properties instead (sets ca_cert/ca_cert2 options for wpa_supplicant).
Readable | Writeable
Setting
§name
The setting’s name, which uniquely identifies the setting within the connection. Each setting type has a name unique to that type, for example “ppp” or “802-11-wireless” or “802-3-ethernet”.
Readable
§Implements
GLib type: GObject with reference counted clone semantics.
Implementations§
Source§impl Setting8021x
impl Setting8021x
Sourcepub fn new() -> Setting8021x
pub fn new() -> Setting8021x
Creates a new #NMSetting8021x object with default values.
§Returns
the new empty #NMSetting8021x object
Sourcepub fn builder() -> Setting8021xBuilder
pub fn builder() -> Setting8021xBuilder
Creates a new builder-pattern struct instance to construct Setting8021x objects.
This method returns an instance of Setting8021xBuilder which can be used to create Setting8021x objects.
Sourcepub fn add_altsubject_match(&self, altsubject_match: &str) -> bool
pub fn add_altsubject_match(&self, altsubject_match: &str) -> bool
Adds an allowed alternate subject name match. Until at least one match is added, the altSubjectName of the remote authentication server is not verified.
§altsubject_match
the altSubjectName to allow for this connection
§Returns
true if the alternative subject name match was
successfully added, false if it was already allowed.
Sourcepub fn add_eap_method(&self, eap: &str) -> bool
pub fn add_eap_method(&self, eap: &str) -> bool
Adds an allowed EAP method. The setting is not valid until at least one EAP method has been added. See #NMSetting8021x:eap property for a list of allowed EAP methods.
§eap
the name of the EAP method to allow for this connection
§Returns
true if the EAP method was successfully added, false if it was
not a valid method or if it was already allowed.
Sourcepub fn add_phase2_altsubject_match(&self, phase2_altsubject_match: &str) -> bool
pub fn add_phase2_altsubject_match(&self, phase2_altsubject_match: &str) -> bool
Adds an allowed alternate subject name match for “phase 2”. Until at least one match is added, the altSubjectName of the “phase 2” remote authentication server is not verified.
§phase2_altsubject_match
the “phase 2” altSubjectName to allow for this connection
§Returns
true if the “phase 2” alternative subject name match was
successfully added, false if it was already allowed.
Sourcepub fn clear_altsubject_matches(&self)
pub fn clear_altsubject_matches(&self)
Clears all altSubjectName matches.
Sourcepub fn clear_eap_methods(&self)
pub fn clear_eap_methods(&self)
Clears all allowed EAP methods.
Sourcepub fn clear_phase2_altsubject_matches(&self)
pub fn clear_phase2_altsubject_matches(&self)
Clears all “phase 2” altSubjectName matches.
Sourcepub fn altsubject_match(&self, i: u32) -> GString
pub fn altsubject_match(&self, i: u32) -> GString
Sourcepub fn anonymous_identity(&self) -> GString
pub fn anonymous_identity(&self) -> GString
Returns the anonymous identifier used by some EAP methods (like TTLS) to authenticate the user in the outer unencrypted “phase 1” authentication. The inner “phase 2” authentication will use the #NMSetting8021x:identity in a secure form, if applicable for that EAP method.
§Returns
the anonymous identifier
Sourcepub fn auth_timeout(&self) -> i32
Available on crate feature v1_8 only.
pub fn auth_timeout(&self) -> i32
v1_8 only.Returns the value contained in the #NMSetting8021x:auth-timeout property.
§Returns
the configured authentication timeout in seconds. Zero means the global default value.
Sourcepub fn ca_cert_password(&self) -> GString
Available on crate feature v1_8 only.
pub fn ca_cert_password(&self) -> GString
v1_8 only.§Returns
the password used to access the CA certificate stored in #NMSetting8021x:ca-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn ca_cert_password_flags(&self) -> SettingSecretFlags
Available on crate feature v1_8 only.
pub fn ca_cert_password_flags(&self) -> SettingSecretFlags
v1_8 only.§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:ca-cert-password
Sourcepub fn ca_cert_path(&self) -> GString
pub fn ca_cert_path(&self) -> GString
Returns the CA certificate path if the CA certificate is stored using the
Setting8021xCKScheme::Path scheme. Not all EAP methods use a
CA certificate (LEAP for example), and those that can take advantage of the
CA certificate allow it to be unset. Note that lack of a CA certificate
reduces security by allowing man-in-the-middle attacks, because the identity
of the network cannot be confirmed by the client.
§Returns
path to the CA certificate file
Sourcepub fn ca_cert_scheme(&self) -> Setting8021xCKScheme
pub fn ca_cert_scheme(&self) -> Setting8021xCKScheme
Returns the scheme used to store the CA certificate. If the returned scheme
is Setting8021xCKScheme::Blob, use nm_setting_802_1x_get_ca_cert_blob();
if Setting8021xCKScheme::Path, use nm_setting_802_1x_get_ca_cert_path();
if Setting8021xCKScheme::Pkcs11, use nm_setting_802_1x_get_ca_cert_uri().
§Returns
scheme used to store the CA certificate (blob or path)
Sourcepub fn ca_cert_uri(&self) -> GString
Available on crate feature v1_6 only.
pub fn ca_cert_uri(&self) -> GString
v1_6 only.Returns the CA certificate URI analogously to nm_setting_802_1x_get_ca_cert_blob() and nm_setting_802_1x_get_ca_cert_path().
Currently, it’s limited to PKCS#11 URIs (‘pkcs11’ scheme as defined by RFC 7512), but may be extended to other schemes in future (such as ‘file’ URIs for local files and ‘data’ URIs for inline certificate data).
§Returns
the URI string
Sourcepub fn ca_path(&self) -> GString
pub fn ca_path(&self) -> GString
Returns the path of the CA certificate directory if previously set. Systems will often have a directory that contains multiple individual CA certificates which the supplicant can then add to the verification chain. This may be used in addition to the #NMSetting8021x:ca-cert property to add more CA certificates for verifying the network to client.
§Returns
the CA certificate directory path
Sourcepub fn client_cert_password(&self) -> GString
Available on crate feature v1_8 only.
pub fn client_cert_password(&self) -> GString
v1_8 only.§Returns
the password used to access the client certificate stored in #NMSetting8021x:client-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn client_cert_password_flags(&self) -> SettingSecretFlags
Available on crate feature v1_8 only.
pub fn client_cert_password_flags(&self) -> SettingSecretFlags
v1_8 only.§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:client-cert-password
Sourcepub fn client_cert_path(&self) -> GString
pub fn client_cert_path(&self) -> GString
Client certificates are used to identify the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
§Returns
path to the client certificate file
Sourcepub fn client_cert_scheme(&self) -> Setting8021xCKScheme
pub fn client_cert_scheme(&self) -> Setting8021xCKScheme
Returns the scheme used to store the client certificate. If the returned scheme
is Setting8021xCKScheme::Blob, use nm_setting_802_1x_get_client_cert_blob();
if Setting8021xCKScheme::Path, use nm_setting_802_1x_get_client_cert_path();
if Setting8021xCKScheme::Pkcs11, use nm_setting_802_1x_get_client_cert_uri().
§Returns
scheme used to store the client certificate (blob or path)
Sourcepub fn client_cert_uri(&self) -> GString
Available on crate feature v1_6 only.
pub fn client_cert_uri(&self) -> GString
v1_6 only.Returns the client certificate URI analogously to nm_setting_802_1x_get_client_cert_blob() and nm_setting_802_1x_get_client_cert_path().
Currently, it’s limited to PKCS#11 URIs (‘pkcs11’ scheme as defined by RFC 7512), but may be extended to other schemes in future (such as ‘file’ URIs for local files and ‘data’ URIs for inline certificate data).
§Returns
the URI string
Sourcepub fn domain_suffix_match(&self) -> GString
Available on crate feature v1_2 only.
pub fn domain_suffix_match(&self) -> GString
v1_2 only.§Returns
the #NMSetting8021x:domain-suffix-match property.
Sourcepub fn eap_method(&self, i: u32) -> GString
pub fn eap_method(&self, i: u32) -> GString
Sourcepub fn identity(&self) -> GString
pub fn identity(&self) -> GString
Returns the identifier used by some EAP methods (like TLS) to authenticate the user. Often this is a username or login name.
§Returns
the user identifier
Sourcepub fn num_altsubject_matches(&self) -> u32
pub fn num_altsubject_matches(&self) -> u32
Returns the number of entries in the #NMSetting8021x:altsubject-matches property of this setting.
§Returns
the number of altsubject-matches entries.
Sourcepub fn num_eap_methods(&self) -> u32
pub fn num_eap_methods(&self) -> u32
Returns the number of eap methods allowed for use when connecting to the network. Generally only one EAP method is used. Use the functions nm_setting_802_1x_get_eap_method(), nm_setting_802_1x_add_eap_method(), and nm_setting_802_1x_remove_eap_method() for adding, removing, and retrieving allowed EAP methods.
§Returns
the number of allowed EAP methods
Sourcepub fn num_phase2_altsubject_matches(&self) -> u32
pub fn num_phase2_altsubject_matches(&self) -> u32
Returns the number of entries in the #NMSetting8021x:phase2-altsubject-matches property of this setting.
§Returns
the number of phase2-altsubject-matches entries.
Sourcepub fn password(&self) -> GString
pub fn password(&self) -> GString
§Returns
the password used by the authentication method, if any, as specified by the #NMSetting8021x:password property
Sourcepub fn password_flags(&self) -> SettingSecretFlags
pub fn password_flags(&self) -> SettingSecretFlags
§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:password
Sourcepub fn password_raw_flags(&self) -> SettingSecretFlags
pub fn password_raw_flags(&self) -> SettingSecretFlags
§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:password-raw
Sourcepub fn phase1_auth_flags(&self) -> Setting8021xAuthFlags
Available on crate feature v1_8 only.
pub fn phase1_auth_flags(&self) -> Setting8021xAuthFlags
v1_8 only.§Returns
the authentication flags for “phase 1”.
Sourcepub fn phase1_fast_provisioning(&self) -> GString
pub fn phase1_fast_provisioning(&self) -> GString
§Returns
whether “phase 1” PEAP fast provisioning should be used, as specified by the #NMSetting8021x:phase1-fast-provisioning property. See the wpa_supplicant documentation for more details.
Sourcepub fn phase1_peaplabel(&self) -> GString
pub fn phase1_peaplabel(&self) -> GString
§Returns
whether the “phase 1” PEAP label is new-style or old-style, to be
used when authenticating with EAP-PEAP, as contained in the
#NMSetting8021x:phase1-peaplabel property. Valid values are None (unset),
“0” (use old-style label), and “1” (use new-style label). See the
wpa_supplicant documentation for more details.
Sourcepub fn phase1_peapver(&self) -> GString
pub fn phase1_peapver(&self) -> GString
Sourcepub fn phase2_altsubject_match(&self, i: u32) -> GString
pub fn phase2_altsubject_match(&self, i: u32) -> GString
Sourcepub fn phase2_auth(&self) -> GString
pub fn phase2_auth(&self) -> GString
§Returns
the “phase 2” non-EAP (ex MD5) allowed authentication method as specified by the #NMSetting8021x:phase2-auth property.
Sourcepub fn phase2_autheap(&self) -> GString
pub fn phase2_autheap(&self) -> GString
§Returns
the “phase 2” EAP-based (ex TLS) allowed authentication method as specified by the #NMSetting8021x:phase2-autheap property.
Sourcepub fn phase2_ca_cert_password(&self) -> GString
Available on crate feature v1_8 only.
pub fn phase2_ca_cert_password(&self) -> GString
v1_8 only.§Returns
the password used to access the “phase2” CA certificate stored in #NMSetting8021x:phase2-ca-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn phase2_ca_cert_password_flags(&self) -> SettingSecretFlags
Available on crate feature v1_8 only.
pub fn phase2_ca_cert_password_flags(&self) -> SettingSecretFlags
v1_8 only.§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:phase2-private-key-password
Sourcepub fn phase2_ca_cert_path(&self) -> GString
pub fn phase2_ca_cert_path(&self) -> GString
Returns the “phase 2” CA certificate path if the CA certificate is stored
using the Setting8021xCKScheme::Path scheme. Not all EAP methods use
a CA certificate (LEAP for example), and those that can take advantage of the
CA certificate allow it to be unset. Note that lack of a CA certificate
reduces security by allowing man-in-the-middle attacks, because the identity
of the network cannot be confirmed by the client.
§Returns
path to the “phase 2” CA certificate file
Sourcepub fn phase2_ca_cert_scheme(&self) -> Setting8021xCKScheme
pub fn phase2_ca_cert_scheme(&self) -> Setting8021xCKScheme
Returns the scheme used to store the “phase 2” CA certificate. If the
returned scheme is Setting8021xCKScheme::Blob, use
nm_setting_802_1x_get_ca_cert_blob(); if Setting8021xCKScheme::Path,
use nm_setting_802_1x_get_ca_cert_path(); if Setting8021xCKScheme::Pkcs11,
use nm_setting_802_1x_get_ca_cert_uri().
§Returns
scheme used to store the “phase 2” CA certificate (blob or path)
Sourcepub fn phase2_ca_cert_uri(&self) -> GString
Available on crate feature v1_6 only.
pub fn phase2_ca_cert_uri(&self) -> GString
v1_6 only.Returns the “phase 2” CA certificate URI analogously to nm_setting_802_1x_get_phase2_ca_cert_blob() and nm_setting_802_1x_get_phase2_ca_cert_path().
Currently, it’s limited to PKCS#11 URIs (‘pkcs11’ scheme as defined by RFC 7512), but may be extended to other schemes in future (such as ‘file’ URIs for local files and ‘data’ URIs for inline certificate data).
§Returns
the URI string
Sourcepub fn phase2_ca_path(&self) -> GString
pub fn phase2_ca_path(&self) -> GString
Returns the path of the “phase 2” CA certificate directory if previously set. Systems will often have a directory that contains multiple individual CA certificates which the supplicant can then add to the verification chain. This may be used in addition to the #NMSetting8021x:phase2-ca-cert property to add more CA certificates for verifying the network to client.
§Returns
the “phase 2” CA certificate directory path
Sourcepub fn phase2_client_cert_password(&self) -> GString
Available on crate feature v1_8 only.
pub fn phase2_client_cert_password(&self) -> GString
v1_8 only.§Returns
the password used to access the “phase2” client certificate stored in #NMSetting8021x:phase2-client-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn phase2_client_cert_password_flags(&self) -> SettingSecretFlags
Available on crate feature v1_8 only.
pub fn phase2_client_cert_password_flags(&self) -> SettingSecretFlags
v1_8 only.§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:phase2-client-cert-password
Sourcepub fn phase2_client_cert_path(&self) -> GString
pub fn phase2_client_cert_path(&self) -> GString
Client certificates are used to identify the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
§Returns
path to the “phase 2” client certificate file
Sourcepub fn phase2_client_cert_scheme(&self) -> Setting8021xCKScheme
pub fn phase2_client_cert_scheme(&self) -> Setting8021xCKScheme
Returns the scheme used to store the “phase 2” client certificate. If the
returned scheme is Setting8021xCKScheme::Blob, use
nm_setting_802_1x_get_client_cert_blob(); if
Setting8021xCKScheme::Path, use
nm_setting_802_1x_get_client_cert_path(); if
Setting8021xCKScheme::Pkcs11, use
nm_setting_802_1x_get_client_cert_uri().
§Returns
scheme used to store the “phase 2” client certificate (blob or path)
Sourcepub fn phase2_client_cert_uri(&self) -> GString
Available on crate feature v1_6 only.
pub fn phase2_client_cert_uri(&self) -> GString
v1_6 only.Returns the “phase 2” client certificate URI analogously to nm_setting_802_1x_get_phase2_ca_cert_blob() and nm_setting_802_1x_get_phase2_ca_cert_path().
Currently, it’s limited to PKCS#11 URIs (‘pkcs11’ scheme as defined by RFC 7512), but may be extended to other schemes in future (such as ‘file’ URIs for local files and ‘data’ URIs for inline certificate data).
§Returns
the URI string
Sourcepub fn phase2_domain_suffix_match(&self) -> GString
Available on crate feature v1_2 only.
pub fn phase2_domain_suffix_match(&self) -> GString
v1_2 only.§Returns
the #NMSetting8021x:phase2-domain-suffix-match property.
Sourcepub fn phase2_private_key_format(&self) -> Setting8021xCKFormat
pub fn phase2_private_key_format(&self) -> Setting8021xCKFormat
§Returns
the data format of the “phase 2” private key data stored in the #NMSetting8021x:phase2-private-key property
Sourcepub fn phase2_private_key_password(&self) -> GString
pub fn phase2_private_key_password(&self) -> GString
§Returns
the private key password used to decrypt the private key if previously set with nm_setting_802_1x_set_phase2_private_key() or the #NMSetting8021x:phase2-private-key-password property.
Sourcepub fn phase2_private_key_password_flags(&self) -> SettingSecretFlags
pub fn phase2_private_key_password_flags(&self) -> SettingSecretFlags
§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:phase2-private-key-password
Sourcepub fn phase2_private_key_path(&self) -> GString
pub fn phase2_private_key_path(&self) -> GString
Private keys are used to authenticate the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
§Returns
path to the “phase 2” private key file
Sourcepub fn phase2_private_key_scheme(&self) -> Setting8021xCKScheme
pub fn phase2_private_key_scheme(&self) -> Setting8021xCKScheme
Returns the scheme used to store the “phase 2” private key. If the returned
scheme is Setting8021xCKScheme::Blob, use
nm_setting_802_1x_get_client_cert_blob(); if
Setting8021xCKScheme::Path, use
nm_setting_802_1x_get_client_cert_path(); if
Setting8021xCKScheme::Pkcs11, use
nm_setting_802_1x_get_client_cert_uri().
§Returns
scheme used to store the “phase 2” private key (blob or path)
Sourcepub fn phase2_private_key_uri(&self) -> GString
Available on crate feature v1_6 only.
pub fn phase2_private_key_uri(&self) -> GString
v1_6 only.Returns the “phase 2” private key URI analogously to nm_setting_802_1x_get_phase2_private_key_blob() and nm_setting_802_1x_get_phase2_private_key_path().
Currently, it’s limited to PKCS#11 URIs (‘pkcs11’ scheme as defined by RFC 7512), but may be extended to other schemes in future (such as ‘file’ URIs for local files and ‘data’ URIs for inline certificate data).
§Returns
the URI string
Sourcepub fn phase2_subject_match(&self) -> GString
pub fn phase2_subject_match(&self) -> GString
Sourcepub fn pin(&self) -> GString
pub fn pin(&self) -> GString
§Returns
the PIN used by the authentication method, if any, as specified by the #NMSetting8021x:pin property
Sourcepub fn pin_flags(&self) -> SettingSecretFlags
pub fn pin_flags(&self) -> SettingSecretFlags
§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:pin
Sourcepub fn private_key_format(&self) -> Setting8021xCKFormat
pub fn private_key_format(&self) -> Setting8021xCKFormat
§Returns
the data format of the private key data stored in the #NMSetting8021x:private-key property
Sourcepub fn private_key_password(&self) -> GString
pub fn private_key_password(&self) -> GString
§Returns
the private key password used to decrypt the private key if previously set with nm_setting_802_1x_set_private_key(), or the #NMSetting8021x:private-key-password property.
Sourcepub fn private_key_password_flags(&self) -> SettingSecretFlags
pub fn private_key_password_flags(&self) -> SettingSecretFlags
§Returns
the #NMSettingSecretFlags pertaining to the #NMSetting8021x:private-key-password
Sourcepub fn private_key_path(&self) -> GString
pub fn private_key_path(&self) -> GString
Private keys are used to authenticate the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
§Returns
path to the private key file
Sourcepub fn private_key_scheme(&self) -> Setting8021xCKScheme
pub fn private_key_scheme(&self) -> Setting8021xCKScheme
Returns the scheme used to store the private key. If the returned scheme is
Setting8021xCKScheme::Blob, use
nm_setting_802_1x_get_client_cert_blob(); if
Setting8021xCKScheme::Path, use
nm_setting_802_1x_get_client_cert_path(); if
Setting8021xCKScheme::Pkcs11, use
nm_setting_802_1x_get_client_cert_uri().
§Returns
scheme used to store the private key (blob or path)
Sourcepub fn private_key_uri(&self) -> GString
Available on crate feature v1_6 only.
pub fn private_key_uri(&self) -> GString
v1_6 only.Returns the private key URI analogously to nm_setting_802_1x_get_private_key_blob() and nm_setting_802_1x_get_private_key_path().
Currently, it’s limited to PKCS#11 URIs (‘pkcs11’ scheme as defined by RFC 7512), but may be extended to other schemes in future (such as ‘file’ URIs for local files and ‘data’ URIs for inline certificate data).
§Returns
the URI string
Sourcepub fn subject_match(&self) -> GString
pub fn subject_match(&self) -> GString
Sourcepub fn is_system_ca_certs(&self) -> bool
pub fn is_system_ca_certs(&self) -> bool
Sets the #NMSetting8021x:system-ca-certs property. The
#NMSetting8021x:ca-path and #NMSetting8021x:phase2-ca-path
properties are ignored if the #NMSetting8021x:system-ca-certs property is
true, in which case a system-wide CA certificate directory specified at
compile time (using the –system-ca-path configure option) is used in place
of these properties.
§Returns
true if a system CA certificate path should be used, false if not
Sourcepub fn remove_altsubject_match(&self, i: u32)
pub fn remove_altsubject_match(&self, i: u32)
Removes the allowed altSubjectName at the specified index.
§i
the index of the altSubjectName match to remove
Sourcepub fn remove_altsubject_match_by_value(&self, altsubject_match: &str) -> bool
pub fn remove_altsubject_match_by_value(&self, altsubject_match: &str) -> bool
Sourcepub fn remove_eap_method(&self, i: u32)
pub fn remove_eap_method(&self, i: u32)
Sourcepub fn remove_eap_method_by_value(&self, eap: &str) -> bool
pub fn remove_eap_method_by_value(&self, eap: &str) -> bool
Sourcepub fn remove_phase2_altsubject_match(&self, i: u32)
pub fn remove_phase2_altsubject_match(&self, i: u32)
Removes the allowed “phase 2” altSubjectName at the specified index.
§i
the index of the “phase 2” altSubjectName match to remove
Sourcepub fn remove_phase2_altsubject_match_by_value(
&self,
phase2_altsubject_match: &str,
) -> bool
pub fn remove_phase2_altsubject_match_by_value( &self, phase2_altsubject_match: &str, ) -> bool
Sourcepub fn set_ca_cert(
&self,
value: &str,
scheme: Setting8021xCKScheme,
out_format: Setting8021xCKFormat,
) -> Result<(), Error>
pub fn set_ca_cert( &self, value: &str, scheme: Setting8021xCKScheme, out_format: Setting8021xCKFormat, ) -> Result<(), Error>
Reads a certificate from disk and sets the #NMSetting8021x:ca-cert property
with the raw certificate data if using the Setting8021xCKScheme::Blob
scheme, or with the path to the certificate file if using the
Setting8021xCKScheme::Path scheme.
§value
when @scheme is set to either Setting8021xCKScheme::Path
or Setting8021xCKScheme::Blob, pass the path of the CA certificate
file (PEM or DER format). The path must be UTF-8 encoded; use
g_filename_to_utf8() to convert if needed. Passing None with any @scheme
clears the CA certificate.
§scheme
desired storage scheme for the certificate
§out_format
on successful return, the type of the certificate added
§Returns
true if the operation succeeded, false if it was unsuccessful
Sourcepub fn set_client_cert(
&self,
value: &str,
scheme: Setting8021xCKScheme,
out_format: Setting8021xCKFormat,
) -> Result<(), Error>
pub fn set_client_cert( &self, value: &str, scheme: Setting8021xCKScheme, out_format: Setting8021xCKFormat, ) -> Result<(), Error>
Reads a certificate from disk and sets the #NMSetting8021x:client-cert
property with the raw certificate data if using the
Setting8021xCKScheme::Blob scheme, or with the path to the certificate
file if using the Setting8021xCKScheme::Path scheme.
Client certificates are used to identify the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
§value
when @scheme is set to either Setting8021xCKScheme::Path
or Setting8021xCKScheme::Blob, pass the path of the client
certificate file (PEM, DER, or PKCS#12 format). The path must be UTF-8
encoded; use g_filename_to_utf8() to convert if needed. Passing None with
any @scheme clears the client certificate.
§scheme
desired storage scheme for the certificate
§out_format
on successful return, the type of the certificate added
§Returns
true if the operation succeeded, false if it was unsuccessful
Sourcepub fn set_phase2_ca_cert(
&self,
value: &str,
scheme: Setting8021xCKScheme,
out_format: Setting8021xCKFormat,
) -> Result<(), Error>
pub fn set_phase2_ca_cert( &self, value: &str, scheme: Setting8021xCKScheme, out_format: Setting8021xCKFormat, ) -> Result<(), Error>
Reads a certificate from disk and sets the #NMSetting8021x:phase2-ca-cert
property with the raw certificate data if using the
Setting8021xCKScheme::Blob scheme, or with the path to the certificate
file if using the Setting8021xCKScheme::Path scheme.
§value
when @scheme is set to either Setting8021xCKScheme::Path
or Setting8021xCKScheme::Blob, pass the path of the “phase2” CA
certificate file (PEM or DER format). The path must be UTF-8 encoded; use
g_filename_to_utf8() to convert if needed. Passing None with any @scheme
clears the “phase2” CA certificate.
§scheme
desired storage scheme for the certificate
§out_format
on successful return, the type of the certificate added
§Returns
true if the operation succeeded, false if it was unsuccessful
Sourcepub fn set_phase2_client_cert(
&self,
value: &str,
scheme: Setting8021xCKScheme,
out_format: Setting8021xCKFormat,
) -> Result<(), Error>
pub fn set_phase2_client_cert( &self, value: &str, scheme: Setting8021xCKScheme, out_format: Setting8021xCKFormat, ) -> Result<(), Error>
Reads a certificate from disk and sets the #NMSetting8021x:phase2-client-cert
property with the raw certificate data if using the
Setting8021xCKScheme::Blob scheme, or with the path to the certificate
file if using the Setting8021xCKScheme::Path scheme.
Client certificates are used to identify the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
§value
when @scheme is set to either Setting8021xCKScheme::Path
or Setting8021xCKScheme::Blob, pass the path of the “phase2” client
certificate file (PEM, DER, or PKCS#12 format). The path must be UTF-8
encoded; use g_filename_to_utf8() to convert if needed. Passing None with
any @scheme clears the “phase2” client certificate.
§scheme
desired storage scheme for the certificate
§out_format
on successful return, the type of the certificate added
§Returns
true if the operation succeeded, false if it was unsuccessful
Sourcepub fn set_phase2_private_key(
&self,
value: &str,
password: &str,
scheme: Setting8021xCKScheme,
out_format: Setting8021xCKFormat,
) -> Result<(), Error>
pub fn set_phase2_private_key( &self, value: &str, password: &str, scheme: Setting8021xCKScheme, out_format: Setting8021xCKFormat, ) -> Result<(), Error>
Private keys are used to authenticate the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
This function reads a private key from disk and sets the
#NMSetting8021x:phase2-private-key property with the private key file data if
using the Setting8021xCKScheme::Blob scheme, or with the path to the
private key file if using the Setting8021xCKScheme::Path scheme.
If @password is given, this function attempts to decrypt the private key to
verify that @password is correct, and if it is, updates the
#NMSetting8021x:phase2-private-key-password property with the given
@password. If the decryption is unsuccessful, false is returned, @error is
set, and no internal data is changed. If no @password is given, the private
key is assumed to be valid, no decryption is performed, and the password may
be set at a later time.
WARNING: the “phase2” private key property is not a “secret” property, and thus unencrypted private key data using the BLOB scheme may be readable by unprivileged users. Private keys should always be encrypted with a private key password to prevent unauthorized access to unencrypted private key data.
§value
when @scheme is set to either Setting8021xCKScheme::Path or
Setting8021xCKScheme::Blob, pass the path of the “phase2” private
key file (PEM, DER, or PKCS#12 format). The path must be UTF-8 encoded;
use g_filename_to_utf8() to convert if needed. Passing None with any
@scheme clears the private key.
§password
password used to decrypt the private key, or None if the password
is unknown. If the password is given but fails to decrypt the private key,
an error is returned.
§scheme
desired storage scheme for the private key
§out_format
on successful return, the type of the private key added
§Returns
true if the operation succeeded, false if it was unsuccessful
Sourcepub fn set_private_key(
&self,
value: &str,
password: &str,
scheme: Setting8021xCKScheme,
out_format: Setting8021xCKFormat,
) -> Result<(), Error>
pub fn set_private_key( &self, value: &str, password: &str, scheme: Setting8021xCKScheme, out_format: Setting8021xCKFormat, ) -> Result<(), Error>
Private keys are used to authenticate the connecting client to the network when EAP-TLS is used as either the “phase 1” or “phase 2” 802.1x authentication method.
This function reads a private key from disk and sets the
#NMSetting8021x:private-key property with the private key file data if using
the Setting8021xCKScheme::Blob scheme, or with the path to the private
key file if using the Setting8021xCKScheme::Path scheme.
If @password is given, this function attempts to decrypt the private key to
verify that @password is correct, and if it is, updates the
#NMSetting8021x:private-key-password property with the given @password. If
the decryption is unsuccessful, false is returned, @error is set, and no
internal data is changed. If no @password is given, the private key is
assumed to be valid, no decryption is performed, and the password may be set
at a later time.
WARNING: the private key property is not a “secret” property, and thus unencrypted private key data using the BLOB scheme may be readable by unprivileged users. Private keys should always be encrypted with a private key password to prevent unauthorized access to unencrypted private key data.
§value
when @scheme is set to either Setting8021xCKScheme::Path or
Setting8021xCKScheme::Blob, pass the path of the private key file
(PEM, DER, or PKCS#12 format). The path must be UTF-8 encoded; use
g_filename_to_utf8() to convert if needed. Passing None with any @scheme
clears the private key.
§password
password used to decrypt the private key, or None if the password
is unknown. If the password is given but fails to decrypt the private key,
an error is returned.
§scheme
desired storage scheme for the private key
§out_format
on successful return, the type of the private key added
§Returns
true if the operation succeeded, false if it was unsuccessful
Sourcepub fn altsubject_matches(&self) -> Vec<GString>
pub fn altsubject_matches(&self) -> Vec<GString>
List of strings to be matched against the altSubjectName of the certificate presented by the authentication server. If the list is empty, no verification of the server certificate’s altSubjectName is performed.
Sourcepub fn set_altsubject_matches(&self, altsubject_matches: &[&str])
pub fn set_altsubject_matches(&self, altsubject_matches: &[&str])
List of strings to be matched against the altSubjectName of the certificate presented by the authentication server. If the list is empty, no verification of the server certificate’s altSubjectName is performed.
Sourcepub fn set_anonymous_identity(&self, anonymous_identity: Option<&str>)
pub fn set_anonymous_identity(&self, anonymous_identity: Option<&str>)
Anonymous identity string for EAP authentication methods. Used as the unencrypted identity with EAP types that support different tunneled identity like EAP-TTLS.
Sourcepub fn set_auth_timeout(&self, auth_timeout: i32)
Available on crate feature v1_8 only.
pub fn set_auth_timeout(&self, auth_timeout: i32)
v1_8 only.A timeout for the authentication. Zero means the global default; if the global default is not set, the authentication timeout is 25 seconds.
Sourcepub fn set_ca_cert_password(&self, ca_cert_password: Option<&str>)
Available on crate feature v1_8 only.
pub fn set_ca_cert_password(&self, ca_cert_password: Option<&str>)
v1_8 only.The password used to access the CA certificate stored in #NMSetting8021x:ca-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn set_ca_cert_password_flags(
&self,
ca_cert_password_flags: SettingSecretFlags,
)
Available on crate feature v1_8 only.
pub fn set_ca_cert_password_flags( &self, ca_cert_password_flags: SettingSecretFlags, )
v1_8 only.Flags indicating how to handle the #NMSetting8021x:ca-cert-password property.
Sourcepub fn set_ca_path(&self, ca_path: Option<&str>)
pub fn set_ca_path(&self, ca_path: Option<&str>)
UTF-8 encoded path to a directory containing PEM or DER formatted certificates to be added to the verification chain in addition to the certificate specified in the #NMSetting8021x:ca-cert property.
If NMSetting8021x:system-ca-certs is enabled and the built-in CA path is an existing directory, then this setting is ignored.
Sourcepub fn set_client_cert_password(&self, client_cert_password: Option<&str>)
Available on crate feature v1_8 only.
pub fn set_client_cert_password(&self, client_cert_password: Option<&str>)
v1_8 only.The password used to access the client certificate stored in #NMSetting8021x:client-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn set_client_cert_password_flags(
&self,
client_cert_password_flags: SettingSecretFlags,
)
Available on crate feature v1_8 only.
pub fn set_client_cert_password_flags( &self, client_cert_password_flags: SettingSecretFlags, )
v1_8 only.Flags indicating how to handle the #NMSetting8021x:client-cert-password property.
Sourcepub fn set_domain_suffix_match(&self, domain_suffix_match: Option<&str>)
Available on crate feature v1_2 only.
pub fn set_domain_suffix_match(&self, domain_suffix_match: Option<&str>)
v1_2 only.Constraint for server domain name. If set, this FQDN is used as a suffix match requirement for dNSName element(s) of the certificate presented by the authentication server. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using same suffix match comparison. Since version 1.24, multiple valid FQDNs can be passed as a “;” delimited list.
Sourcepub fn eap(&self) -> Vec<GString>
pub fn eap(&self) -> Vec<GString>
The allowed EAP method to be used when authenticating to the network with 802.1x. Valid methods are: “leap”, “md5”, “tls”, “peap”, “ttls”, “pwd”, and “fast”. Each method requires different configuration using the properties of this setting; refer to wpa_supplicant documentation for the allowed combinations.
Sourcepub fn set_eap(&self, eap: &[&str])
pub fn set_eap(&self, eap: &[&str])
The allowed EAP method to be used when authenticating to the network with 802.1x. Valid methods are: “leap”, “md5”, “tls”, “peap”, “ttls”, “pwd”, and “fast”. Each method requires different configuration using the properties of this setting; refer to wpa_supplicant documentation for the allowed combinations.
Sourcepub fn set_identity(&self, identity: Option<&str>)
pub fn set_identity(&self, identity: Option<&str>)
Identity string for EAP authentication methods. Often the user’s user or login name.
Sourcepub fn set_pac_file(&self, pac_file: Option<&str>)
pub fn set_pac_file(&self, pac_file: Option<&str>)
UTF-8 encoded file path containing PAC for EAP-FAST.
Sourcepub fn set_password(&self, password: Option<&str>)
pub fn set_password(&self, password: Option<&str>)
UTF-8 encoded password used for EAP authentication methods. If both the #NMSetting8021x:password property and the #NMSetting8021x:password-raw property are specified, #NMSetting8021x:password is preferred.
Sourcepub fn set_password_flags(&self, password_flags: SettingSecretFlags)
pub fn set_password_flags(&self, password_flags: SettingSecretFlags)
Flags indicating how to handle the #NMSetting8021x:password property.
Sourcepub fn set_password_raw_flags(&self, password_raw_flags: SettingSecretFlags)
pub fn set_password_raw_flags(&self, password_raw_flags: SettingSecretFlags)
Flags indicating how to handle the #NMSetting8021x:password-raw property.
Sourcepub fn set_phase1_auth_flags(&self, phase1_auth_flags: u32)
Available on crate feature v1_8 only.
pub fn set_phase1_auth_flags(&self, phase1_auth_flags: u32)
v1_8 only.Specifies authentication flags to use in “phase 1” outer authentication using #NMSetting8021xAuthFlags options. The individual TLS versions can be explicitly disabled. TLS time checks can be also disabled. If a certain TLS disable flag is not set, it is up to the supplicant to allow or forbid it. The TLS options map to tls_disable_tlsv1_x and tls_disable_time_checks settings. See the wpa_supplicant documentation for more details.
Sourcepub fn set_phase1_fast_provisioning(
&self,
phase1_fast_provisioning: Option<&str>,
)
pub fn set_phase1_fast_provisioning( &self, phase1_fast_provisioning: Option<&str>, )
Enables or disables in-line provisioning of EAP-FAST credentials when FAST is specified as the EAP method in the #NMSetting8021x:eap property. Recognized values are “0” (disabled), “1” (allow unauthenticated provisioning), “2” (allow authenticated provisioning), and “3” (allow both authenticated and unauthenticated provisioning). See the wpa_supplicant documentation for more details.
Sourcepub fn set_phase1_peaplabel(&self, phase1_peaplabel: Option<&str>)
pub fn set_phase1_peaplabel(&self, phase1_peaplabel: Option<&str>)
Forces use of the new PEAP label during key derivation. Some RADIUS servers may require forcing the new PEAP label to interoperate with PEAPv1. Set to “1” to force use of the new PEAP label. See the wpa_supplicant documentation for more details.
Sourcepub fn set_phase1_peapver(&self, phase1_peapver: Option<&str>)
pub fn set_phase1_peapver(&self, phase1_peapver: Option<&str>)
Forces which PEAP version is used when PEAP is set as the EAP method in the #NMSetting8021x:eap property. When unset, the version reported by the server will be used. Sometimes when using older RADIUS servers, it is necessary to force the client to use a particular PEAP version. To do so, this property may be set to “0” or “1” to force that specific PEAP version.
Sourcepub fn phase2_altsubject_matches(&self) -> Vec<GString>
pub fn phase2_altsubject_matches(&self) -> Vec<GString>
List of strings to be matched against the altSubjectName of the certificate presented by the authentication server during the inner “phase 2” authentication. If the list is empty, no verification of the server certificate’s altSubjectName is performed.
Sourcepub fn set_phase2_altsubject_matches(&self, phase2_altsubject_matches: &[&str])
pub fn set_phase2_altsubject_matches(&self, phase2_altsubject_matches: &[&str])
List of strings to be matched against the altSubjectName of the certificate presented by the authentication server during the inner “phase 2” authentication. If the list is empty, no verification of the server certificate’s altSubjectName is performed.
Sourcepub fn set_phase2_auth(&self, phase2_auth: Option<&str>)
pub fn set_phase2_auth(&self, phase2_auth: Option<&str>)
Specifies the allowed “phase 2” inner authentication method when an EAP method that uses an inner TLS tunnel is specified in the #NMSetting8021x:eap property. For TTLS this property selects one of the supported non-EAP inner methods: “pap”, “chap”, “mschap”, “mschapv2” while #NMSetting8021x:phase2-autheap selects an EAP inner method. For PEAP this selects an inner EAP method, one of: “gtc”, “otp”, “md5” and “tls”. Each “phase 2” inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details. Both #NMSetting8021x:phase2-auth and #NMSetting8021x:phase2-autheap cannot be specified.
Sourcepub fn set_phase2_autheap(&self, phase2_autheap: Option<&str>)
pub fn set_phase2_autheap(&self, phase2_autheap: Option<&str>)
Specifies the allowed “phase 2” inner EAP-based authentication method when TTLS is specified in the #NMSetting8021x:eap property. Recognized EAP-based “phase 2” methods are “md5”, “mschapv2”, “otp”, “gtc”, and “tls”. Each “phase 2” inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details.
Sourcepub fn set_phase2_ca_cert_password(&self, phase2_ca_cert_password: Option<&str>)
Available on crate feature v1_8 only.
pub fn set_phase2_ca_cert_password(&self, phase2_ca_cert_password: Option<&str>)
v1_8 only.The password used to access the “phase2” CA certificate stored in #NMSetting8021x:phase2-ca-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn set_phase2_ca_cert_password_flags(
&self,
phase2_ca_cert_password_flags: SettingSecretFlags,
)
Available on crate feature v1_8 only.
pub fn set_phase2_ca_cert_password_flags( &self, phase2_ca_cert_password_flags: SettingSecretFlags, )
v1_8 only.Flags indicating how to handle the #NMSetting8021x:phase2-ca-cert-password property.
Sourcepub fn set_phase2_ca_path(&self, phase2_ca_path: Option<&str>)
pub fn set_phase2_ca_path(&self, phase2_ca_path: Option<&str>)
UTF-8 encoded path to a directory containing PEM or DER formatted certificates to be added to the verification chain in addition to the certificate specified in the #NMSetting8021x:phase2-ca-cert property.
If NMSetting8021x:system-ca-certs is enabled and the built-in CA path is an existing directory, then this setting is ignored.
Sourcepub fn set_phase2_client_cert_password(
&self,
phase2_client_cert_password: Option<&str>,
)
Available on crate feature v1_8 only.
pub fn set_phase2_client_cert_password( &self, phase2_client_cert_password: Option<&str>, )
v1_8 only.The password used to access the “phase2” client certificate stored in #NMSetting8021x:phase2-client-cert property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login.
Sourcepub fn set_phase2_client_cert_password_flags(
&self,
phase2_client_cert_password_flags: SettingSecretFlags,
)
Available on crate feature v1_8 only.
pub fn set_phase2_client_cert_password_flags( &self, phase2_client_cert_password_flags: SettingSecretFlags, )
v1_8 only.Flags indicating how to handle the #NMSetting8021x:phase2-client-cert-password property.
Sourcepub fn set_phase2_domain_suffix_match(
&self,
phase2_domain_suffix_match: Option<&str>,
)
Available on crate feature v1_2 only.
pub fn set_phase2_domain_suffix_match( &self, phase2_domain_suffix_match: Option<&str>, )
v1_2 only.Constraint for server domain name. If set, this FQDN is used as a suffix match requirement for dNSName element(s) of the certificate presented by the authentication server during the inner “phase 2” authentication. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using same suffix match comparison. Since version 1.24, multiple valid FQDNs can be passed as a “;” delimited list.
Sourcepub fn set_phase2_private_key_password(
&self,
phase2_private_key_password: Option<&str>,
)
pub fn set_phase2_private_key_password( &self, phase2_private_key_password: Option<&str>, )
The password used to decrypt the “phase 2” private key specified in the #NMSetting8021x:phase2-private-key property when the private key either uses the path scheme, or is a PKCS#12 format key. Setting this property directly is not generally necessary except when returning secrets to NetworkManager; it is generally set automatically when setting the private key by the nm_setting_802_1x_set_phase2_private_key() function.
Sourcepub fn set_phase2_private_key_password_flags(
&self,
phase2_private_key_password_flags: SettingSecretFlags,
)
pub fn set_phase2_private_key_password_flags( &self, phase2_private_key_password_flags: SettingSecretFlags, )
Flags indicating how to handle the #NMSetting8021x:phase2-private-key-password property.
Sourcepub fn set_phase2_subject_match(&self, phase2_subject_match: Option<&str>)
👎Deprecated: Since 1.2
pub fn set_phase2_subject_match(&self, phase2_subject_match: Option<&str>)
Substring to be matched against the subject of the certificate presented by the authentication server during the inner “phase 2” authentication. When unset, no verification of the authentication server certificate’s subject is performed. This property provides little security, if any, and should not be used.
§Deprecated since 1.2
Use #NMSetting8021x:phase2-domain-suffix-match instead.
Sourcepub fn set_pin_flags(&self, pin_flags: SettingSecretFlags)
pub fn set_pin_flags(&self, pin_flags: SettingSecretFlags)
Flags indicating how to handle the #NMSetting8021x:pin property.
Sourcepub fn set_private_key_password(&self, private_key_password: Option<&str>)
pub fn set_private_key_password(&self, private_key_password: Option<&str>)
The password used to decrypt the private key specified in the #NMSetting8021x:private-key property when the private key either uses the path scheme, or if the private key is a PKCS#12 format key. Setting this property directly is not generally necessary except when returning secrets to NetworkManager; it is generally set automatically when setting the private key by the nm_setting_802_1x_set_private_key() function.
Sourcepub fn set_private_key_password_flags(
&self,
private_key_password_flags: SettingSecretFlags,
)
pub fn set_private_key_password_flags( &self, private_key_password_flags: SettingSecretFlags, )
Flags indicating how to handle the #NMSetting8021x:private-key-password property.
Sourcepub fn set_subject_match(&self, subject_match: Option<&str>)
👎Deprecated: Since 1.2
pub fn set_subject_match(&self, subject_match: Option<&str>)
Substring to be matched against the subject of the certificate presented by the authentication server. When unset, no verification of the authentication server certificate’s subject is performed. This property provides little security, if any, and should not be used.
§Deprecated since 1.2
Use #NMSetting8021x:phase2-domain-suffix-match instead.
Sourcepub fn set_system_ca_certs(&self, system_ca_certs: bool)
pub fn set_system_ca_certs(&self, system_ca_certs: bool)
When true, overrides the #NMSetting8021x:ca-path and
#NMSetting8021x:phase2-ca-path properties using the system CA directory
specified at configure time with the –system-ca-path switch. The
certificates in this directory are added to the verification chain in
addition to any certificates specified by the #NMSetting8021x:ca-cert and
#NMSetting8021x:phase2-ca-cert properties. If the path provided with
–system-ca-path is rather a file name (bundle of trusted CA certificates),
it overrides #NMSetting8021x:ca-cert and #NMSetting8021x:phase2-ca-cert
properties instead (sets ca_cert/ca_cert2 options for wpa_supplicant).
pub fn connect_altsubject_matches_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_anonymous_identity_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_auth_timeout_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_ca_cert_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_ca_cert_password_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_ca_cert_password_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_ca_path_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_client_cert_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_client_cert_password_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_client_cert_password_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_domain_suffix_match_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_2 only.pub fn connect_eap_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_identity_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_pac_file_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_password_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_password_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_password_raw_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_password_raw_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase1_auth_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_phase1_fast_provisioning_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase1_peaplabel_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase1_peapver_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_altsubject_matches_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_auth_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_autheap_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_ca_cert_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_ca_cert_password_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_phase2_ca_cert_password_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_phase2_ca_path_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_client_cert_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_client_cert_password_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_phase2_client_cert_password_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_8 only.pub fn connect_phase2_domain_suffix_match_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
v1_2 only.pub fn connect_phase2_private_key_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_private_key_password_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_private_key_password_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_phase2_subject_match_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_pin_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_pin_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_private_key_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_private_key_password_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_private_key_password_flags_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_subject_match_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
pub fn connect_system_ca_certs_notify<F: Fn(&Self) + 'static>( &self, f: F, ) -> SignalHandlerId
Trait Implementations§
Source§impl Clone for Setting8021x
impl Clone for Setting8021x
Source§impl Debug for Setting8021x
impl Debug for Setting8021x
Source§impl Default for Setting8021x
impl Default for Setting8021x
Source§impl HasParamSpec for Setting8021x
impl HasParamSpec for Setting8021x
type ParamSpec = ParamSpecObject
Source§type SetValue = Setting8021x
type SetValue = Setting8021x
type BuilderFn = fn(&str) -> ParamSpecObjectBuilder<'_, Setting8021x>
fn param_spec_builder() -> Self::BuilderFn
Source§impl Hash for Setting8021x
impl Hash for Setting8021x
Source§impl Ord for Setting8021x
impl Ord for Setting8021x
Source§fn cmp(&self, other: &Self) -> Ordering
fn cmp(&self, other: &Self) -> Ordering
Comparison for two GObjects.
Compares the memory addresses of the provided objects.
1.21.0 · Source§fn max(self, other: Self) -> Selfwhere
Self: Sized,
fn max(self, other: Self) -> Selfwhere
Self: Sized,
Source§impl ParentClassIs for Setting8021x
impl ParentClassIs for Setting8021x
Source§impl<OT: ObjectType> PartialEq<OT> for Setting8021x
impl<OT: ObjectType> PartialEq<OT> for Setting8021x
Source§impl<OT: ObjectType> PartialOrd<OT> for Setting8021x
impl<OT: ObjectType> PartialOrd<OT> for Setting8021x
Source§impl StaticType for Setting8021x
impl StaticType for Setting8021x
Source§fn static_type() -> Type
fn static_type() -> Type
Self.impl Eq for Setting8021x
impl IsA<Setting> for Setting8021x
Auto Trait Implementations§
impl Freeze for Setting8021x
impl RefUnwindSafe for Setting8021x
impl !Send for Setting8021x
impl !Sync for Setting8021x
impl Unpin for Setting8021x
impl UnwindSafe for Setting8021x
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> Cast for Twhere
T: ObjectType,
impl<T> Cast for Twhere
T: ObjectType,
Source§fn upcast<T>(self) -> Twhere
T: ObjectType,
Self: IsA<T>,
fn upcast<T>(self) -> Twhere
T: ObjectType,
Self: IsA<T>,
T. Read moreSource§fn upcast_ref<T>(&self) -> &Twhere
T: ObjectType,
Self: IsA<T>,
fn upcast_ref<T>(&self) -> &Twhere
T: ObjectType,
Self: IsA<T>,
T. Read moreSource§fn downcast<T>(self) -> Result<T, Self>where
T: ObjectType,
Self: MayDowncastTo<T>,
fn downcast<T>(self) -> Result<T, Self>where
T: ObjectType,
Self: MayDowncastTo<T>,
T. Read moreSource§fn downcast_ref<T>(&self) -> Option<&T>where
T: ObjectType,
Self: MayDowncastTo<T>,
fn downcast_ref<T>(&self) -> Option<&T>where
T: ObjectType,
Self: MayDowncastTo<T>,
T. Read moreSource§fn dynamic_cast<T>(self) -> Result<T, Self>where
T: ObjectType,
fn dynamic_cast<T>(self) -> Result<T, Self>where
T: ObjectType,
T. This handles upcasting, downcasting
and casting between interface and interface implementors. All checks are performed at
runtime, while upcast will do many checks at compile-time already. downcast will
perform the same checks at runtime as dynamic_cast, but will also ensure some amount of
compile-time safety. Read moreSource§fn dynamic_cast_ref<T>(&self) -> Option<&T>where
T: ObjectType,
fn dynamic_cast_ref<T>(&self) -> Option<&T>where
T: ObjectType,
T. This handles upcasting, downcasting
and casting between interface and interface implementors. All checks are performed at
runtime, while downcast and upcast will do many checks at compile-time already. Read moreSource§unsafe fn unsafe_cast<T>(self) -> Twhere
T: ObjectType,
unsafe fn unsafe_cast<T>(self) -> Twhere
T: ObjectType,
T unconditionally. Read moreSource§unsafe fn unsafe_cast_ref<T>(&self) -> &Twhere
T: ObjectType,
unsafe fn unsafe_cast_ref<T>(&self) -> &Twhere
T: ObjectType,
&T unconditionally. Read moreSource§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *const GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GPtrArray> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
impl<T> FromGlibPtrArrayContainerAsVec<<T as GlibPtrDefault>::GlibType, *mut GSList> for Twhere
T: GlibPtrDefault + FromGlibPtrNone<<T as GlibPtrDefault>::GlibType> + FromGlibPtrFull<<T as GlibPtrDefault>::GlibType>,
Source§impl<T> IntoClosureReturnValue for T
impl<T> IntoClosureReturnValue for T
fn into_closure_return_value(self) -> Option<Value>
Source§impl<U> IsSubclassableExt for Uwhere
U: IsClass + ParentClassIs,
impl<U> IsSubclassableExt for Uwhere
U: IsClass + ParentClassIs,
fn parent_class_init<T>(class: &mut Class<U>)
fn parent_instance_init<T>(instance: &mut InitializingObject<T>)
Source§impl<T> ObjectExt for Twhere
T: ObjectType,
impl<T> ObjectExt for Twhere
T: ObjectType,
Source§fn is<U>(&self) -> boolwhere
U: StaticType,
fn is<U>(&self) -> boolwhere
U: StaticType,
true if the object is an instance of (can be cast to) T.Source§fn object_class(&self) -> &Class<Object>
fn object_class(&self) -> &Class<Object>
ObjectClass of the object. Read moreSource§fn class_of<U>(&self) -> Option<&Class<U>>where
U: IsClass,
fn class_of<U>(&self) -> Option<&Class<U>>where
U: IsClass,
T. Read moreSource§fn interface<U>(&self) -> Option<InterfaceRef<'_, U>>where
U: IsInterface,
fn interface<U>(&self) -> Option<InterfaceRef<'_, U>>where
U: IsInterface,
T of the object. Read moreSource§fn set_property_from_value(&self, property_name: &str, value: &Value)
fn set_property_from_value(&self, property_name: &str, value: &Value)
Source§fn set_properties(&self, property_values: &[(&str, &dyn ToValue)])
fn set_properties(&self, property_values: &[(&str, &dyn ToValue)])
Source§fn set_properties_from_value(&self, property_values: &[(&str, Value)])
fn set_properties_from_value(&self, property_values: &[(&str, Value)])
Source§fn property<V>(&self, property_name: &str) -> Vwhere
V: for<'b> FromValue<'b> + 'static,
fn property<V>(&self, property_name: &str) -> Vwhere
V: for<'b> FromValue<'b> + 'static,
property_name of the object and cast it to the type V. Read moreSource§fn property_value(&self, property_name: &str) -> Value
fn property_value(&self, property_name: &str) -> Value
property_name of the object. Read moreSource§fn has_property(&self, property_name: &str) -> bool
fn has_property(&self, property_name: &str) -> bool
property_name.Source§fn has_property_with_type(&self, property_name: &str, type_: Type) -> bool
fn has_property_with_type(&self, property_name: &str, type_: Type) -> bool
property_name of the given type_.Source§fn property_type(&self, property_name: &str) -> Option<Type>
fn property_type(&self, property_name: &str) -> Option<Type>
property_name of this object. Read moreSource§fn find_property(&self, property_name: &str) -> Option<ParamSpec>
fn find_property(&self, property_name: &str) -> Option<ParamSpec>
ParamSpec of the property property_name of this object.Source§fn list_properties(&self) -> PtrSlice<ParamSpec>
fn list_properties(&self) -> PtrSlice<ParamSpec>
ParamSpec of the properties of this object.Source§fn freeze_notify(&self) -> PropertyNotificationFreezeGuard
fn freeze_notify(&self) -> PropertyNotificationFreezeGuard
Source§unsafe fn set_qdata<QD>(&self, key: Quark, value: QD)where
QD: 'static,
unsafe fn set_qdata<QD>(&self, key: Quark, value: QD)where
QD: 'static,
key. Read moreSource§unsafe fn qdata<QD>(&self, key: Quark) -> Option<NonNull<QD>>where
QD: 'static,
unsafe fn qdata<QD>(&self, key: Quark) -> Option<NonNull<QD>>where
QD: 'static,
key. Read moreSource§unsafe fn steal_qdata<QD>(&self, key: Quark) -> Option<QD>where
QD: 'static,
unsafe fn steal_qdata<QD>(&self, key: Quark) -> Option<QD>where
QD: 'static,
key. Read moreSource§unsafe fn set_data<QD>(&self, key: &str, value: QD)where
QD: 'static,
unsafe fn set_data<QD>(&self, key: &str, value: QD)where
QD: 'static,
key. Read moreSource§unsafe fn data<QD>(&self, key: &str) -> Option<NonNull<QD>>where
QD: 'static,
unsafe fn data<QD>(&self, key: &str) -> Option<NonNull<QD>>where
QD: 'static,
key. Read moreSource§unsafe fn steal_data<QD>(&self, key: &str) -> Option<QD>where
QD: 'static,
unsafe fn steal_data<QD>(&self, key: &str) -> Option<QD>where
QD: 'static,
key. Read moreSource§fn block_signal(&self, handler_id: &SignalHandlerId)
fn block_signal(&self, handler_id: &SignalHandlerId)
Source§fn unblock_signal(&self, handler_id: &SignalHandlerId)
fn unblock_signal(&self, handler_id: &SignalHandlerId)
Source§fn stop_signal_emission(&self, signal_id: SignalId, detail: Option<Quark>)
fn stop_signal_emission(&self, signal_id: SignalId, detail: Option<Quark>)
Source§fn stop_signal_emission_by_name(&self, signal_name: &str)
fn stop_signal_emission_by_name(&self, signal_name: &str)
Source§fn connect<F>(
&self,
signal_name: &str,
after: bool,
callback: F,
) -> SignalHandlerId
fn connect<F>( &self, signal_name: &str, after: bool, callback: F, ) -> SignalHandlerId
signal_name on this object. Read moreSource§fn connect_id<F>(
&self,
signal_id: SignalId,
details: Option<Quark>,
after: bool,
callback: F,
) -> SignalHandlerId
fn connect_id<F>( &self, signal_id: SignalId, details: Option<Quark>, after: bool, callback: F, ) -> SignalHandlerId
signal_id on this object. Read moreSource§fn connect_local<F>(
&self,
signal_name: &str,
after: bool,
callback: F,
) -> SignalHandlerId
fn connect_local<F>( &self, signal_name: &str, after: bool, callback: F, ) -> SignalHandlerId
signal_name on this object. Read moreSource§fn connect_local_id<F>(
&self,
signal_id: SignalId,
details: Option<Quark>,
after: bool,
callback: F,
) -> SignalHandlerId
fn connect_local_id<F>( &self, signal_id: SignalId, details: Option<Quark>, after: bool, callback: F, ) -> SignalHandlerId
signal_id on this object. Read moreSource§unsafe fn connect_unsafe<F>(
&self,
signal_name: &str,
after: bool,
callback: F,
) -> SignalHandlerId
unsafe fn connect_unsafe<F>( &self, signal_name: &str, after: bool, callback: F, ) -> SignalHandlerId
signal_name on this object. Read moreSource§unsafe fn connect_unsafe_id<F>(
&self,
signal_id: SignalId,
details: Option<Quark>,
after: bool,
callback: F,
) -> SignalHandlerId
unsafe fn connect_unsafe_id<F>( &self, signal_id: SignalId, details: Option<Quark>, after: bool, callback: F, ) -> SignalHandlerId
signal_id on this object. Read moreSource§fn connect_closure(
&self,
signal_name: &str,
after: bool,
closure: RustClosure,
) -> SignalHandlerId
fn connect_closure( &self, signal_name: &str, after: bool, closure: RustClosure, ) -> SignalHandlerId
signal_name on this object. Read moreSource§fn connect_closure_id(
&self,
signal_id: SignalId,
details: Option<Quark>,
after: bool,
closure: RustClosure,
) -> SignalHandlerId
fn connect_closure_id( &self, signal_id: SignalId, details: Option<Quark>, after: bool, closure: RustClosure, ) -> SignalHandlerId
signal_id on this object. Read moreSource§fn watch_closure(&self, closure: &impl AsRef<Closure>)
fn watch_closure(&self, closure: &impl AsRef<Closure>)
closure to the lifetime of the object. When
the object’s reference count drops to zero, the closure will be
invalidated. An invalidated closure will ignore any calls to
invoke_with_values, or
invoke when using Rust closures.Source§fn emit<R>(&self, signal_id: SignalId, args: &[&dyn ToValue]) -> Rwhere
R: TryFromClosureReturnValue,
fn emit<R>(&self, signal_id: SignalId, args: &[&dyn ToValue]) -> Rwhere
R: TryFromClosureReturnValue,
Source§fn emit_with_values(&self, signal_id: SignalId, args: &[Value]) -> Option<Value>
fn emit_with_values(&self, signal_id: SignalId, args: &[Value]) -> Option<Value>
Self::emit but takes Value for the arguments.Source§fn emit_by_name<R>(&self, signal_name: &str, args: &[&dyn ToValue]) -> Rwhere
R: TryFromClosureReturnValue,
fn emit_by_name<R>(&self, signal_name: &str, args: &[&dyn ToValue]) -> Rwhere
R: TryFromClosureReturnValue,
Source§fn emit_by_name_with_values(
&self,
signal_name: &str,
args: &[Value],
) -> Option<Value>
fn emit_by_name_with_values( &self, signal_name: &str, args: &[Value], ) -> Option<Value>
Source§fn emit_by_name_with_details<R>(
&self,
signal_name: &str,
details: Quark,
args: &[&dyn ToValue],
) -> Rwhere
R: TryFromClosureReturnValue,
fn emit_by_name_with_details<R>(
&self,
signal_name: &str,
details: Quark,
args: &[&dyn ToValue],
) -> Rwhere
R: TryFromClosureReturnValue,
Source§fn emit_by_name_with_details_and_values(
&self,
signal_name: &str,
details: Quark,
args: &[Value],
) -> Option<Value>
fn emit_by_name_with_details_and_values( &self, signal_name: &str, details: Quark, args: &[Value], ) -> Option<Value>
Source§fn emit_with_details<R>(
&self,
signal_id: SignalId,
details: Quark,
args: &[&dyn ToValue],
) -> Rwhere
R: TryFromClosureReturnValue,
fn emit_with_details<R>(
&self,
signal_id: SignalId,
details: Quark,
args: &[&dyn ToValue],
) -> Rwhere
R: TryFromClosureReturnValue,
Source§fn emit_with_details_and_values(
&self,
signal_id: SignalId,
details: Quark,
args: &[Value],
) -> Option<Value>
fn emit_with_details_and_values( &self, signal_id: SignalId, details: Quark, args: &[Value], ) -> Option<Value>
Source§fn disconnect(&self, handler_id: SignalHandlerId)
fn disconnect(&self, handler_id: SignalHandlerId)
Source§fn connect_notify<F>(&self, name: Option<&str>, f: F) -> SignalHandlerId
fn connect_notify<F>(&self, name: Option<&str>, f: F) -> SignalHandlerId
notify signal of the object. Read moreSource§fn connect_notify_local<F>(&self, name: Option<&str>, f: F) -> SignalHandlerId
fn connect_notify_local<F>(&self, name: Option<&str>, f: F) -> SignalHandlerId
notify signal of the object. Read moreSource§unsafe fn connect_notify_unsafe<F>(
&self,
name: Option<&str>,
f: F,
) -> SignalHandlerId
unsafe fn connect_notify_unsafe<F>( &self, name: Option<&str>, f: F, ) -> SignalHandlerId
notify signal of the object. Read moreSource§fn notify(&self, property_name: &str)
fn notify(&self, property_name: &str)
Source§fn notify_by_pspec(&self, pspec: &ParamSpec)
fn notify_by_pspec(&self, pspec: &ParamSpec)
Source§fn add_weak_ref_notify<F>(&self, f: F) -> WeakRefNotify<T>
fn add_weak_ref_notify<F>(&self, f: F) -> WeakRefNotify<T>
Source§fn add_weak_ref_notify_local<F>(&self, f: F) -> WeakRefNotify<T>where
F: FnOnce() + 'static,
fn add_weak_ref_notify_local<F>(&self, f: F) -> WeakRefNotify<T>where
F: FnOnce() + 'static,
Source§fn bind_property<'a, 'f, 't, O>(
&'a self,
source_property: &'a str,
target: &'a O,
target_property: &'a str,
) -> BindingBuilder<'a, 'f, 't>where
O: ObjectType,
fn bind_property<'a, 'f, 't, O>(
&'a self,
source_property: &'a str,
target: &'a O,
target_property: &'a str,
) -> BindingBuilder<'a, 'f, 't>where
O: ObjectType,
Source§unsafe fn run_dispose(&self)
unsafe fn run_dispose(&self)
Source§impl<T> PropertyGet for Twhere
T: HasParamSpec,
impl<T> PropertyGet for Twhere
T: HasParamSpec,
Source§impl<O> SettingExt for O
impl<O> SettingExt for O
fn compare(&self, b: &impl IsA<Setting>, flags: SettingCompareFlags) -> bool
Source§fn secret_flags(
&self,
secret_name: &str,
out_flags: SettingSecretFlags,
) -> Result<(), Error>
fn secret_flags( &self, secret_name: &str, out_flags: SettingSecretFlags, ) -> Result<(), Error>
Source§fn set_secret_flags(
&self,
secret_name: &str,
flags: SettingSecretFlags,
) -> Result<(), Error>
fn set_secret_flags( &self, secret_name: &str, flags: SettingSecretFlags, ) -> Result<(), Error>
Source§fn to_str(&self) -> GString
fn to_str(&self) -> GString
Source§fn verify(&self, connection: Option<&impl IsA<Connection>>) -> Result<(), Error>
fn verify(&self, connection: Option<&impl IsA<Connection>>) -> Result<(), Error>
Source§fn verify_secrets(
&self,
connection: Option<&impl IsA<Connection>>,
) -> Result<(), Error>
fn verify_secrets( &self, connection: Option<&impl IsA<Connection>>, ) -> Result<(), Error>
v1_2 only.