From: Gagandeep Singh Date: Fri, 20 May 2022 04:21:04 +0000 (+0530) Subject: doc: add missing auth algo for IPsec example X-Git-Url: http://git.droids-corp.org/?a=commitdiff_plain;h=d05828ac583876f05590ac14136c398a54014bc6;p=dpdk.git doc: add missing auth algo for IPsec example Adding the missing SHA256-HMAC authentication algorithm in ipsec-secgw guide. Fixes: b5350285ce6e ("examples/ipsec-secgw: support SHA256 HMAC") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh Acked-by: Akhil Goyal --- diff --git a/doc/guides/sample_app_ug/ipsec_secgw.rst b/doc/guides/sample_app_ug/ipsec_secgw.rst index 5cb6a69a27..94197a34f0 100644 --- a/doc/guides/sample_app_ug/ipsec_secgw.rst +++ b/doc/guides/sample_app_ug/ipsec_secgw.rst @@ -116,8 +116,8 @@ Constraints * No IPv6 options headers. * No AH mode. * Supported algorithms: AES-CBC, AES-CTR, AES-GCM, 3DES-CBC, DES-CBC, - HMAC-SHA1, AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM, CHACHA20_POLY1305 - and NULL. + HMAC-SHA1, HMAC-SHA256, AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM, + CHACHA20_POLY1305 and NULL. * Each SA must be handle by a unique lcore (*1 RX queue per port*). Compiling the Application @@ -595,6 +595,7 @@ where each options means: * *null*: NULL algorithm * *sha1-hmac*: HMAC SHA1 algorithm + * *sha256-hmac*: HMAC SHA256 algorithm * *aes-xcbc-mac*: AES XCBC MAC algorithm ````