summaryrefslogtreecommitdiff
path: root/interface-definitions/interfaces-macsec.xml.in
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2020-05-21 11:13:56 +0200
committerChristian Poessinger <christian@poessinger.com>2020-05-21 11:59:08 +0200
commitf48f19063561639d65b76f241f17f0704ba69644 (patch)
tree10715db78b3ee51504d629d153f73e848567518b /interface-definitions/interfaces-macsec.xml.in
parent576951171b25bf3f5427c45e40bd540105f558b3 (diff)
downloadvyos-1x-f48f19063561639d65b76f241f17f0704ba69644.tar.gz
vyos-1x-f48f19063561639d65b76f241f17f0704ba69644.zip
macsec: T2023: remove gcm-aes-256 cipher type
Cipher type gcm-aes-256 is supported by Linux 4.19 but it is not available in iproute2 4.19. We could backport it of course but the plan is to Upgrade to a more recent 5.x series kernel anyway once all out-of-tree module issues are resolved, mainly Intel QAT. gcm-aes-256 support was added to iproute2 package with commit b16f5253233 ("Add support for configuring MACsec gcm-aes-256 cipher type.") which made it into the 5.2 release of iproute2.
Diffstat (limited to 'interface-definitions/interfaces-macsec.xml.in')
-rw-r--r--interface-definitions/interfaces-macsec.xml.in10
1 files changed, 3 insertions, 7 deletions
diff --git a/interface-definitions/interfaces-macsec.xml.in b/interface-definitions/interfaces-macsec.xml.in
index 13448e758..f16760112 100644
--- a/interface-definitions/interfaces-macsec.xml.in
+++ b/interface-definitions/interfaces-macsec.xml.in
@@ -19,20 +19,16 @@
#include <include/address-ipv4-ipv6.xml.i>
<leafNode name="cipher">
<properties>
- <help>Cipher suite used (default: gcm-aes-128)</help>
+ <help>Cipher suite used</help>
<completionHelp>
- <list>gcm-aes-128 gcm-aes-256</list>
+ <list>gcm-aes-128</list>
</completionHelp>
<valueHelp>
<format>gcm-aes-128</format>
<description>Galois/Counter Mode of AES cipher with 128-bit key (default)</description>
</valueHelp>
- <valueHelp>
- <format>gcm-aes-256</format>
- <description>Galois/Counter Mode of AES cipher with 256-bit key</description>
- </valueHelp>
<constraint>
- <regex>(gcm-aes-128|gcm-aes-256)</regex>
+ <regex>(gcm-aes-128)</regex>
</constraint>
</properties>
</leafNode>