diff options
author | Vratko Polak <vrpolak@cisco.com> | 2024-05-29 15:20:02 +0200 |
---|---|---|
committer | Vratko Polak <vrpolak@cisco.com> | 2024-05-31 14:06:29 +0000 |
commit | b9dff484de0725bca3f65739519d952e3be55cbe (patch) | |
tree | 6ecda55b599c8227f025c316b6054374106202e0 /docs/content | |
parent | 3d20e3980839f01466c5750c2372fba55c47768e (diff) |
feat(ipsec): Add suites for more algs
+ Add suite with UDP encap.
+ Add suite with anti replay enabled.
+ Add new enums where needed by the new suites.
+ Apply trimming in enum_util to support "3DES".
+ All 10ktnl suites written and tested.
+ New robot tags added.
+ Fix one comment from the parent.
Change-Id: I2581814dbb327891d8658dd009c4e52ffd318e3b
Signed-off-by: Vratko Polak <vrpolak@cisco.com>
Diffstat (limited to 'docs/content')
-rw-r--r-- | docs/content/overview/csit/test_tags.md | 32 |
1 files changed, 30 insertions, 2 deletions
diff --git a/docs/content/overview/csit/test_tags.md b/docs/content/overview/csit/test_tags.md index de38945c17..23e09f925e 100644 --- a/docs/content/overview/csit/test_tags.md +++ b/docs/content/overview/csit/test_tags.md @@ -774,23 +774,43 @@ For traffic between DUTs, or for "secondary" traffic, see ${overhead} value. **AES** - IPSec using AES algorithms. + IPSec using AES encrytion algorithms. **AES_128_CBC** IPSec using AES 128 CBC algorithms. +**AES_128_CTR** + + IPSec using AES 128 CTR algorithms. + **AES_128_GCM** IPSec using AES 128 GCM algorithms. +**AES_128_NULL_GMAC** + + IPSec using AES 128 NULL GMAC algorithms. + +**AES_256_CBC** + + IPSec using AES 256 CBC algorithms. + **AES_256_GCM** IPSec using AES 256 GCM algorithms. +**AES_256_NULL_GMAC** + + IPSec using AES 256 NULL GMAC algorithms. + **HMAC** - IPSec using HMAC integrity algorithms. + IPSec using HMAC integrity/authorization algorithms. + +**HMAC_SHA_96** + + IPSec using HMAC SHA 96 integrity algorithms. **HMAC_SHA_256** @@ -800,6 +820,14 @@ For traffic between DUTs, or for "secondary" traffic, see ${overhead} value. IPSec using HMAC SHA 512 integrity algorithms. +**UDP_ENCAP** + + Encapsulate IPsec traffic in UDP. + +**ANTI_REPLAY** + + Enable IPsec Anti-Replay functionality. + **SCHEDULER** IPSec using crypto sw scheduler engine. |