| Top |
| #define | NM_SETTING_MACSEC_SETTING_NAME |
| #define | NM_SETTING_MACSEC_PARENT |
| #define | NM_SETTING_MACSEC_MODE |
| #define | NM_SETTING_MACSEC_ENCRYPT |
| #define | NM_SETTING_MACSEC_MKA_CAK |
| #define | NM_SETTING_MACSEC_MKA_CAK_FLAGS |
| #define | NM_SETTING_MACSEC_MKA_CKN |
| #define | NM_SETTING_MACSEC_PORT |
| #define | NM_SETTING_MACSEC_VALIDATION |
| #define | NM_SETTING_MACSEC_SEND_SCI |
| #define | NM_SETTING_MACSEC_OFFLOAD |
| enum | NMSettingMacsecMode |
| enum | NMSettingMacsecValidation |
| #define | NM_SETTING_MACSEC_MKA_CAK_LENGTH |
| #define | NM_SETTING_MACSEC_MKA_CKN_LENGTH |
| enum | NMSettingMacsecOffload |
GEnum ├── NMSettingMacsecMode ├── NMSettingMacsecOffload ╰── NMSettingMacsecValidation
The NMSettingMacsec object is a NMSetting subclass that describes properties necessary for connection to MACsec (IEEE 802.1AE) interfaces.
NMSetting *
nm_setting_macsec_new (void);
Creates a new NMSettingMacsec object with default values.
Since: 1.6
const char *
nm_setting_macsec_get_parent (NMSettingMacsec *setting);
Since: 1.6
NMSettingMacsecMode
nm_setting_macsec_get_mode (NMSettingMacsec *setting);
Since: 1.6
gboolean
nm_setting_macsec_get_encrypt (NMSettingMacsec *setting);
Since: 1.6
const char *
nm_setting_macsec_get_mka_cak (NMSettingMacsec *setting);
Since: 1.6
NMSettingSecretFlags
nm_setting_macsec_get_mka_cak_flags (NMSettingMacsec *setting);
Since: 1.6
const char *
nm_setting_macsec_get_mka_ckn (NMSettingMacsec *setting);
Since: 1.6
NMSettingMacsecValidation
nm_setting_macsec_get_validation (NMSettingMacsec *setting);
Since: 1.6
gboolean
nm_setting_macsec_get_send_sci (NMSettingMacsec *setting);
Since: 1.12
NMSettingMacsecOffload
nm_setting_macsec_get_offload (NMSettingMacsec *setting);
Since: 1.46
NMSettingMacsecMode controls how the CAK (Connectivity Association Key) used in MKA (MACsec Key Agreement) is obtained.
Since: 1.6
NMSettingMacsecValidation specifies a validation mode for incoming frames.
|
All incoming frames are accepted if possible |
||
|
Non protected, invalid, or impossible to verify frames are accepted and counted as "invalid" |
||
|
Non protected, invalid, or impossible to verify frames are dropped |
Since: 1.6