diff options
author | Vratko Polak <vrpolak@cisco.com> | 2024-05-29 15:20:02 +0200 |
---|---|---|
committer | Vratko Polak <vrpolak@cisco.com> | 2024-05-31 14:06:48 +0000 |
commit | d26edc6d9bbc4112a91d294eccc570cbb87af693 (patch) | |
tree | effe5921ed1f03c597304fd0a67a759b3cf34c7f /docs/content/overview | |
parent | dc85c836d1615923def23f77c734c082d63df6df (diff) |
feat(ipsec): Add suites for more algs
+ Add suite with UDP encap.
+ Add suite with anti replay enabled.
+ Add new enums where needed by the new suites.
+ Apply trimming in enum_util to support "3DES".
+ All 10ktnl suites written and tested.
+ New robot tags added.
+ Fix one comment from the parent.
Change-Id: I2581814dbb327891d8658dd009c4e52ffd318e3b
Signed-off-by: Vratko Polak <vrpolak@cisco.com>
(cherry picked from commit da8033a0b40e7a45d449597bb7141dffa6ef94ef)
Diffstat (limited to 'docs/content/overview')
-rw-r--r-- | docs/content/overview/csit/test_tags.md | 32 |
1 files changed, 30 insertions, 2 deletions
diff --git a/docs/content/overview/csit/test_tags.md b/docs/content/overview/csit/test_tags.md index de38945c17..23e09f925e 100644 --- a/docs/content/overview/csit/test_tags.md +++ b/docs/content/overview/csit/test_tags.md @@ -774,23 +774,43 @@ For traffic between DUTs, or for "secondary" traffic, see ${overhead} value. **AES** - IPSec using AES algorithms. + IPSec using AES encrytion algorithms. **AES_128_CBC** IPSec using AES 128 CBC algorithms. +**AES_128_CTR** + + IPSec using AES 128 CTR algorithms. + **AES_128_GCM** IPSec using AES 128 GCM algorithms. +**AES_128_NULL_GMAC** + + IPSec using AES 128 NULL GMAC algorithms. + +**AES_256_CBC** + + IPSec using AES 256 CBC algorithms. + **AES_256_GCM** IPSec using AES 256 GCM algorithms. +**AES_256_NULL_GMAC** + + IPSec using AES 256 NULL GMAC algorithms. + **HMAC** - IPSec using HMAC integrity algorithms. + IPSec using HMAC integrity/authorization algorithms. + +**HMAC_SHA_96** + + IPSec using HMAC SHA 96 integrity algorithms. **HMAC_SHA_256** @@ -800,6 +820,14 @@ For traffic between DUTs, or for "secondary" traffic, see ${overhead} value. IPSec using HMAC SHA 512 integrity algorithms. +**UDP_ENCAP** + + Encapsulate IPsec traffic in UDP. + +**ANTI_REPLAY** + + Enable IPsec Anti-Replay functionality. + **SCHEDULER** IPSec using crypto sw scheduler engine. |