diff options
author | Peter Mikus <pmikus@cisco.com> | 2019-05-17 12:17:06 +0000 |
---|---|---|
committer | Peter Mikus <pmikus@cisco.com> | 2019-05-23 05:21:54 +0000 |
commit | 2ada04e25cf023118116a9949abaf192bf9b7920 (patch) | |
tree | 8c909d89a9468dd1017436a93c50c8d941e94ead /docs | |
parent | 5b179672b7954890072331a6fda1b88040f913ba (diff) |
CSIT-1506: Rework IPsec base testcases
- Add:
aes-128-gcm aes-128-gcm
aes-256-gcm aes-256-gcm
aes-128-cbc hmac-sha-256
aes-256-cbc hmac-sha-512
- Remove:
hmac-sha1
- Scale will follow in next patch
Change-Id: I789f71cf66cf61b8dbb3c6dbe9b6fdc79866ac33
Signed-off-by: Peter Mikus <pmikus@cisco.com>
Diffstat (limited to 'docs')
-rw-r--r-- | docs/tag_documentation.rst | 28 |
1 files changed, 24 insertions, 4 deletions
diff --git a/docs/tag_documentation.rst b/docs/tag_documentation.rst index 7ddc532e52..de56babadf 100644 --- a/docs/tag_documentation.rst +++ b/docs/tag_documentation.rst @@ -653,13 +653,33 @@ Encryption Tags IPSec in interface mode. -.. topic:: AES_GCM +.. topic:: AES - IPSec using AES GCM algorithms. + IPSec using AES algorithms. -.. topic:: CBC_SHA1 +.. topic:: AES_128_CBC - IPSec using CBC SHA1 algorithms. + IPSec using AES 128 CBC algorithms. + +.. topic:: AES_128_GCM + + IPSec using AES 128 GCM algorithms. + +.. topic:: AES_256_GCM + + IPSec using AES 256 GCM algorithms. + +.. topic:: HMAC + + IPSec using HMAC integrity algorithms. + +.. topic:: HMAC_SHA_256 + + IPSec using HMAC SHA 256 integrity algorithms. + +.. topic:: HMAC_SHA_512 + + IPSec using HMAC SHA 512 integrity algorithms. Client-Workload Tags -------------------- |