I was taking a look at the authentication TLV implementation for linuxPTP stack.
If I understand correctly, once you configure two nodes and if you provide a pair of keys to the two nodes, authentication TLV plays straight and it does not require any special implementation on top of that right?