summaryrefslogtreecommitdiff
path: root/data
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2020-05-21 15:04:24 +0200
committerChristian Poessinger <christian@poessinger.com>2020-05-21 15:05:53 +0200
commit68d54d8d79f257497c884b392a7e316e9a8e7d21 (patch)
treef6a6ee6f646072e73e40bb65c862dd67e9c1d1b9 /data
parent3872f5995644a8a52358285d682a7103b54dde04 (diff)
downloadvyos-1x-68d54d8d79f257497c884b392a7e316e9a8e7d21.tar.gz
vyos-1x-68d54d8d79f257497c884b392a7e316e9a8e7d21.zip
macsec: T2023: rename "security key" node to "security mka"
MACsec always talks about MKA (MACsec Key Agreement protocol) thus the node should reflect that.
Diffstat (limited to 'data')
-rw-r--r--data/templates/macsec/wpa_supplicant.conf.tmpl12
1 files changed, 10 insertions, 2 deletions
diff --git a/data/templates/macsec/wpa_supplicant.conf.tmpl b/data/templates/macsec/wpa_supplicant.conf.tmpl
index b73d4b863..df7b6f153 100644
--- a/data/templates/macsec/wpa_supplicant.conf.tmpl
+++ b/data/templates/macsec/wpa_supplicant.conf.tmpl
@@ -47,7 +47,15 @@ network={
# 1: Integrity only
macsec_integ_only={{ '0' if security_encrypt else '1' }}
- mka_cak={{ security_key_cak }}
- mka_ckn={{ security_key_ckn }}
+ # mka_cak, mka_ckn, and mka_priority: IEEE 802.1X/MACsec pre-shared key mode
+ # This allows to configure MACsec with a pre-shared key using a (CAK,CKN) pair.
+ # In this mode, instances of wpa_supplicant can act as MACsec peers. The peer
+ # with lower priority will become the key server and start distributing SAKs.
+ # mka_cak (CAK = Secure Connectivity Association Key) takes a 16-byte (128-bit)
+ # hex-string (32 hex-digits) or a 32-byte (256-bit) hex-string (64 hex-digits)
+ # mka_ckn (CKN = CAK Name) takes a 1..32-bytes (8..256 bit) hex-string
+ # (2..64 hex-digits)
+ mka_cak={{ security_mka_cak }}
+ mka_ckn={{ security_mka_ckn }}
}