aboutsummaryrefslogtreecommitdiffstats
path: root/docs/content/overview
diff options
context:
space:
mode:
authorVratko Polak <vrpolak@cisco.com>2024-05-29 15:20:02 +0200
committerVratko Polak <vrpolak@cisco.com>2024-05-31 14:06:29 +0000
commitb9dff484de0725bca3f65739519d952e3be55cbe (patch)
tree6ecda55b599c8227f025c316b6054374106202e0 /docs/content/overview
parent3d20e3980839f01466c5750c2372fba55c47768e (diff)
feat(ipsec): Add suites for more algs
+ Add suite with UDP encap. + Add suite with anti replay enabled. + Add new enums where needed by the new suites. + Apply trimming in enum_util to support "3DES". + All 10ktnl suites written and tested. + New robot tags added. + Fix one comment from the parent. Change-Id: I2581814dbb327891d8658dd009c4e52ffd318e3b Signed-off-by: Vratko Polak <vrpolak@cisco.com>
Diffstat (limited to 'docs/content/overview')
-rw-r--r--docs/content/overview/csit/test_tags.md32
1 files changed, 30 insertions, 2 deletions
diff --git a/docs/content/overview/csit/test_tags.md b/docs/content/overview/csit/test_tags.md
index de38945c17..23e09f925e 100644
--- a/docs/content/overview/csit/test_tags.md
+++ b/docs/content/overview/csit/test_tags.md
@@ -774,23 +774,43 @@ For traffic between DUTs, or for "secondary" traffic, see ${overhead} value.
**AES**
- IPSec using AES algorithms.
+ IPSec using AES encrytion algorithms.
**AES_128_CBC**
IPSec using AES 128 CBC algorithms.
+**AES_128_CTR**
+
+ IPSec using AES 128 CTR algorithms.
+
**AES_128_GCM**
IPSec using AES 128 GCM algorithms.
+**AES_128_NULL_GMAC**
+
+ IPSec using AES 128 NULL GMAC algorithms.
+
+**AES_256_CBC**
+
+ IPSec using AES 256 CBC algorithms.
+
**AES_256_GCM**
IPSec using AES 256 GCM algorithms.
+**AES_256_NULL_GMAC**
+
+ IPSec using AES 256 NULL GMAC algorithms.
+
**HMAC**
- IPSec using HMAC integrity algorithms.
+ IPSec using HMAC integrity/authorization algorithms.
+
+**HMAC_SHA_96**
+
+ IPSec using HMAC SHA 96 integrity algorithms.
**HMAC_SHA_256**
@@ -800,6 +820,14 @@ For traffic between DUTs, or for "secondary" traffic, see ${overhead} value.
IPSec using HMAC SHA 512 integrity algorithms.
+**UDP_ENCAP**
+
+ Encapsulate IPsec traffic in UDP.
+
+**ANTI_REPLAY**
+
+ Enable IPsec Anti-Replay functionality.
+
**SCHEDULER**
IPSec using crypto sw scheduler engine.