get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/110376/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 110376,
    "url": "http://patches.dpdk.org/api/patches/110376/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20220427151054.2536675-7-gakhil@marvell.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220427151054.2536675-7-gakhil@marvell.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220427151054.2536675-7-gakhil@marvell.com",
    "date": "2022-04-27T15:10:53",
    "name": "[v5,6/7] test/security: add ESN and anti-replay cases for inline",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "24e816fc3fad89071f24ecef7ac5d92c3ed958d6",
    "submitter": {
        "id": 2094,
        "url": "http://patches.dpdk.org/api/people/2094/?format=api",
        "name": "Akhil Goyal",
        "email": "gakhil@marvell.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20220427151054.2536675-7-gakhil@marvell.com/mbox/",
    "series": [
        {
            "id": 22697,
            "url": "http://patches.dpdk.org/api/series/22697/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=22697",
            "date": "2022-04-27T15:10:47",
            "name": "app/test: add inline IPsec and reassembly cases",
            "version": 5,
            "mbox": "http://patches.dpdk.org/series/22697/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/110376/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/110376/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 805FBA034C;\n\tWed, 27 Apr 2022 17:11:51 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id B4AF642813;\n\tWed, 27 Apr 2022 17:11:28 +0200 (CEST)",
            "from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com\n [67.231.148.174])\n by mails.dpdk.org (Postfix) with ESMTP id 8AB7A42811\n for <dev@dpdk.org>; Wed, 27 Apr 2022 17:11:27 +0200 (CEST)",
            "from pps.filterd (m0045849.ppops.net [127.0.0.1])\n by mx0a-0016f401.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id\n 23R8vUbi029540;\n Wed, 27 Apr 2022 08:11:26 -0700",
            "from dc5-exch01.marvell.com ([199.233.59.181])\n by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3fprsqub7q-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Wed, 27 Apr 2022 08:11:26 -0700",
            "from DC5-EXCH02.marvell.com (10.69.176.39) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server (TLS) id 15.0.1497.2;\n Wed, 27 Apr 2022 08:11:25 -0700",
            "from maili.marvell.com (10.69.176.80) by DC5-EXCH02.marvell.com\n (10.69.176.39) with Microsoft SMTP Server id 15.0.1497.18 via Frontend\n Transport; Wed, 27 Apr 2022 08:11:25 -0700",
            "from localhost.localdomain (unknown [10.28.48.55])\n by maili.marvell.com (Postfix) with ESMTP id 769695B6947;\n Wed, 27 Apr 2022 08:11:21 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-transfer-encoding : content-type; s=pfpt0220;\n bh=KZ5RaKhj2+6ZQfihaOPKbPDOzh+fsvkAzLZ4wF64YS0=;\n b=SQbA6wnG+tufcXexDPCRgB2vSa53KjLQz3bHJ9TA4fVwRL/F8NtQvVyy3uww6uQ7R/H0\n Fe6vW2P2yxeBhww9+gNyWbx02iSGu0Nr30atzy3D8O+zScCBgLmdMSY1lHJyGFx+NIir\n 4sBxPg9fyGNsE4r+d/Fn+FmiqpBHVIUaKJOsNwzzU+1JCi7C13a0Dt5k9WvUh32sMfml\n mBXyppWoZvCK66yKvI1MN8h1i4RoIYgHm9TnGVmzZGz9bwESoF+WwDLnvSeP1zXpN4mw\n lqcovPPSf4DhxmVfrlmN97ecXvknNgKIhFWLTGr4hfJ5XNCrVZfvcLII9yUnuBL1vbss FQ==",
        "From": "Akhil Goyal <gakhil@marvell.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<thomas@monjalon.net>, <david.marchand@redhat.com>,\n <hemant.agrawal@nxp.com>, <anoobj@marvell.com>,\n <konstantin.ananyev@intel.com>, <ciara.power@intel.com>,\n <ferruh.yigit@intel.com>, <andrew.rybchenko@oktetlabs.ru>,\n <ndabilpuram@marvell.com>, <vattunuru@marvell.com>, Akhil Goyal\n <gakhil@marvell.com>",
        "Subject": "[PATCH v5 6/7] test/security: add ESN and anti-replay cases for\n inline",
        "Date": "Wed, 27 Apr 2022 20:40:53 +0530",
        "Message-ID": "<20220427151054.2536675-7-gakhil@marvell.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20220427151054.2536675-1-gakhil@marvell.com>",
        "References": "<20220416192530.173895-1-gakhil@marvell.com>\n <20220427151054.2536675-1-gakhil@marvell.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-Proofpoint-ORIG-GUID": "gIxE2UeDYt8gNbg9-N-cyMO693iQgfLV",
        "X-Proofpoint-GUID": "gIxE2UeDYt8gNbg9-N-cyMO693iQgfLV",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.205,Aquarius:18.0.858,Hydra:6.0.486,FMLib:17.11.64.514\n definitions=2022-04-27_04,2022-04-27_01,2022-02-23_01",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Added cases to test anti replay for inline IPsec processing\nwith and without extended sequence number support.\n\nSigned-off-by: Akhil Goyal <gakhil@marvell.com>\n---\n app/test/test_security_inline_proto.c | 308 ++++++++++++++++++++++++++\n 1 file changed, 308 insertions(+)",
    "diff": "diff --git a/app/test/test_security_inline_proto.c b/app/test/test_security_inline_proto.c\nindex 055b753634..009405f403 100644\n--- a/app/test/test_security_inline_proto.c\n+++ b/app/test/test_security_inline_proto.c\n@@ -1091,6 +1091,136 @@ test_ipsec_inline_proto_all(const struct ipsec_test_flags *flags)\n \t\treturn TEST_SKIPPED;\n }\n \n+static int\n+test_ipsec_inline_proto_process_with_esn(struct ipsec_test_data td[],\n+\t\tstruct ipsec_test_data res_d[],\n+\t\tint nb_pkts,\n+\t\tbool silent,\n+\t\tconst struct ipsec_test_flags *flags)\n+{\n+\tstruct rte_security_session_conf sess_conf = {0};\n+\tstruct ipsec_test_data *res_d_tmp = NULL;\n+\tstruct rte_crypto_sym_xform cipher = {0};\n+\tstruct rte_crypto_sym_xform auth = {0};\n+\tstruct rte_crypto_sym_xform aead = {0};\n+\tstruct rte_mbuf *rx_pkt = NULL;\n+\tstruct rte_mbuf *tx_pkt = NULL;\n+\tint nb_rx, nb_sent;\n+\tstruct rte_security_session *ses;\n+\tstruct rte_security_ctx *ctx;\n+\tuint32_t ol_flags;\n+\tint i, ret;\n+\n+\tif (td[0].aead) {\n+\t\tsess_conf.crypto_xform = &aead;\n+\t} else {\n+\t\tif (td[0].ipsec_xform.direction ==\n+\t\t\t\tRTE_SECURITY_IPSEC_SA_DIR_EGRESS) {\n+\t\t\tsess_conf.crypto_xform = &cipher;\n+\t\t\tsess_conf.crypto_xform->type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\t\t\tsess_conf.crypto_xform->next = &auth;\n+\t\t\tsess_conf.crypto_xform->next->type = RTE_CRYPTO_SYM_XFORM_AUTH;\n+\t\t} else {\n+\t\t\tsess_conf.crypto_xform = &auth;\n+\t\t\tsess_conf.crypto_xform->type = RTE_CRYPTO_SYM_XFORM_AUTH;\n+\t\t\tsess_conf.crypto_xform->next = &cipher;\n+\t\t\tsess_conf.crypto_xform->next->type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\t\t}\n+\t}\n+\n+\t/* Create Inline IPsec session. */\n+\tret = create_inline_ipsec_session(&td[0], port_id, &ses, &ctx,\n+\t\t\t\t\t  &ol_flags, flags, &sess_conf);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tif (td[0].ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS)\n+\t\tcreate_default_flow(port_id);\n+\n+\tfor (i = 0; i < nb_pkts; i++) {\n+\t\ttx_pkt = init_packet(mbufpool, td[i].input_text.data,\n+\t\t\t\t\ttd[i].input_text.len);\n+\t\tif (tx_pkt == NULL) {\n+\t\t\tret = TEST_FAILED;\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\tif (test_ipsec_pkt_update(rte_pktmbuf_mtod_offset(tx_pkt,\n+\t\t\t\t\tuint8_t *, RTE_ETHER_HDR_LEN), flags)) {\n+\t\t\tret = TEST_FAILED;\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\tif (td[i].ipsec_xform.direction ==\n+\t\t\t\tRTE_SECURITY_IPSEC_SA_DIR_EGRESS) {\n+\t\t\tif (flags->antireplay) {\n+\t\t\t\tsess_conf.ipsec.esn.value =\n+\t\t\t\t\t\ttd[i].ipsec_xform.esn.value;\n+\t\t\t\tret = rte_security_session_update(ctx, ses,\n+\t\t\t\t\t\t&sess_conf);\n+\t\t\t\tif (ret) {\n+\t\t\t\t\tprintf(\"Could not update ESN in session\\n\");\n+\t\t\t\t\trte_pktmbuf_free(tx_pkt);\n+\t\t\t\t\tgoto out;\n+\t\t\t\t}\n+\t\t\t}\n+\t\t\tif (ol_flags & RTE_SECURITY_TX_OLOAD_NEED_MDATA)\n+\t\t\t\trte_security_set_pkt_metadata(ctx, ses,\n+\t\t\t\t\t\ttx_pkt, NULL);\n+\t\t\ttx_pkt->ol_flags |= RTE_MBUF_F_TX_SEC_OFFLOAD;\n+\t\t}\n+\t\t/* Send packet to ethdev for inline IPsec processing. */\n+\t\tnb_sent = rte_eth_tx_burst(port_id, 0, &tx_pkt, 1);\n+\t\tif (nb_sent != 1) {\n+\t\t\tprintf(\"\\nUnable to TX packets\");\n+\t\t\trte_pktmbuf_free(tx_pkt);\n+\t\t\tret = TEST_FAILED;\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\trte_pause();\n+\n+\t\t/* Receive back packet on loopback interface. */\n+\t\tdo {\n+\t\t\trte_delay_ms(1);\n+\t\t\tnb_rx = rte_eth_rx_burst(port_id, 0, &rx_pkt, 1);\n+\t\t} while (nb_rx == 0);\n+\n+\t\trte_pktmbuf_adj(rx_pkt, RTE_ETHER_HDR_LEN);\n+\n+\t\tif (res_d != NULL)\n+\t\t\tres_d_tmp = &res_d[i];\n+\n+\t\tret = test_ipsec_post_process(rx_pkt, &td[i],\n+\t\t\t\t\t      res_d_tmp, silent, flags);\n+\t\tif (ret != TEST_SUCCESS) {\n+\t\t\trte_pktmbuf_free(rx_pkt);\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\tret = test_ipsec_stats_verify(ctx, ses, flags,\n+\t\t\t\t\ttd->ipsec_xform.direction);\n+\t\tif (ret != TEST_SUCCESS) {\n+\t\t\trte_pktmbuf_free(rx_pkt);\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\trte_pktmbuf_free(rx_pkt);\n+\t\trx_pkt = NULL;\n+\t\ttx_pkt = NULL;\n+\t\tres_d_tmp = NULL;\n+\t}\n+\n+out:\n+\tif (td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS)\n+\t\tdestroy_default_flow(port_id);\n+\n+\t/* Destroy session so that other cases can create the session again */\n+\trte_security_session_destroy(ctx, ses);\n+\tses = NULL;\n+\n+\treturn ret;\n+}\n \n static int\n ut_setup_inline_ipsec(void)\n@@ -1702,6 +1832,153 @@ test_ipsec_inline_proto_known_vec_fragmented(const void *test_data)\n \treturn test_ipsec_inline_proto_process(&td_outb, NULL, 1, false,\n \t\t\t\t\t\t&flags);\n }\n+\n+static int\n+test_ipsec_inline_pkt_replay(const void *test_data, const uint64_t esn[],\n+\t\t      bool replayed_pkt[], uint32_t nb_pkts, bool esn_en,\n+\t\t      uint64_t winsz)\n+{\n+\tstruct ipsec_test_data td_outb[IPSEC_TEST_PACKETS_MAX];\n+\tstruct ipsec_test_data td_inb[IPSEC_TEST_PACKETS_MAX];\n+\tstruct ipsec_test_flags flags;\n+\tuint32_t i, ret = 0;\n+\n+\tmemset(&flags, 0, sizeof(flags));\n+\tflags.antireplay = true;\n+\n+\tfor (i = 0; i < nb_pkts; i++) {\n+\t\tmemcpy(&td_outb[i], test_data, sizeof(td_outb));\n+\t\ttd_outb[i].ipsec_xform.options.iv_gen_disable = 1;\n+\t\ttd_outb[i].ipsec_xform.replay_win_sz = winsz;\n+\t\ttd_outb[i].ipsec_xform.options.esn = esn_en;\n+\t}\n+\n+\tfor (i = 0; i < nb_pkts; i++)\n+\t\ttd_outb[i].ipsec_xform.esn.value = esn[i];\n+\n+\tret = test_ipsec_inline_proto_process_with_esn(td_outb, td_inb,\n+\t\t\t\tnb_pkts, true, &flags);\n+\tif (ret != TEST_SUCCESS)\n+\t\treturn ret;\n+\n+\ttest_ipsec_td_update(td_inb, td_outb, nb_pkts, &flags);\n+\n+\tfor (i = 0; i < nb_pkts; i++) {\n+\t\ttd_inb[i].ipsec_xform.options.esn = esn_en;\n+\t\t/* Set antireplay flag for packets to be dropped */\n+\t\ttd_inb[i].ar_packet = replayed_pkt[i];\n+\t}\n+\n+\tret = test_ipsec_inline_proto_process_with_esn(td_inb, NULL, nb_pkts,\n+\t\t\t\ttrue, &flags);\n+\n+\treturn ret;\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay(const void *test_data, uint64_t winsz)\n+{\n+\n+\tuint32_t nb_pkts = 5;\n+\tbool replayed_pkt[5];\n+\tuint64_t esn[5];\n+\n+\t/* 1. Advance the TOP of the window to WS * 2 */\n+\tesn[0] = winsz * 2;\n+\t/* 2. Test sequence number within the new window(WS + 1) */\n+\tesn[1] = winsz + 1;\n+\t/* 3. Test sequence number less than the window BOTTOM */\n+\tesn[2] = winsz;\n+\t/* 4. Test sequence number in the middle of the window */\n+\tesn[3] = winsz + (winsz / 2);\n+\t/* 5. Test replay of the packet in the middle of the window */\n+\tesn[4] = winsz + (winsz / 2);\n+\n+\treplayed_pkt[0] = false;\n+\treplayed_pkt[1] = false;\n+\treplayed_pkt[2] = true;\n+\treplayed_pkt[3] = false;\n+\treplayed_pkt[4] = true;\n+\n+\treturn test_ipsec_inline_pkt_replay(test_data, esn, replayed_pkt,\n+\t\t\tnb_pkts, false, winsz);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay1024(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_antireplay(test_data, 1024);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay2048(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_antireplay(test_data, 2048);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay4096(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_antireplay(test_data, 4096);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay(const void *test_data, uint64_t winsz)\n+{\n+\n+\tuint32_t nb_pkts = 7;\n+\tbool replayed_pkt[7];\n+\tuint64_t esn[7];\n+\n+\t/* Set the initial sequence number */\n+\tesn[0] = (uint64_t)(0xFFFFFFFF - winsz);\n+\t/* 1. Advance the TOP of the window to (1<<32 + WS/2) */\n+\tesn[1] = (uint64_t)((1ULL << 32) + (winsz / 2));\n+\t/* 2. Test sequence number within new window (1<<32 + WS/2 + 1) */\n+\tesn[2] = (uint64_t)((1ULL << 32) - (winsz / 2) + 1);\n+\t/* 3. Test with sequence number within window (1<<32 - 1) */\n+\tesn[3] = (uint64_t)((1ULL << 32) - 1);\n+\t/* 4. Test with sequence number within window (1<<32 - 1) */\n+\tesn[4] = (uint64_t)(1ULL << 32);\n+\t/* 5. Test with duplicate sequence number within\n+\t * new window (1<<32 - 1)\n+\t */\n+\tesn[5] = (uint64_t)((1ULL << 32) - 1);\n+\t/* 6. Test with duplicate sequence number within new window (1<<32) */\n+\tesn[6] = (uint64_t)(1ULL << 32);\n+\n+\treplayed_pkt[0] = false;\n+\treplayed_pkt[1] = false;\n+\treplayed_pkt[2] = false;\n+\treplayed_pkt[3] = false;\n+\treplayed_pkt[4] = false;\n+\treplayed_pkt[5] = true;\n+\treplayed_pkt[6] = true;\n+\n+\treturn test_ipsec_inline_pkt_replay(test_data, esn, replayed_pkt, nb_pkts,\n+\t\t\t\t     true, winsz);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay1024(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_esn_antireplay(test_data, 1024);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay2048(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_esn_antireplay(test_data, 2048);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay4096(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_esn_antireplay(test_data, 4096);\n+}\n+\n+\n+\n static struct unit_test_suite inline_ipsec_testsuite  = {\n \t.suite_name = \"Inline IPsec Ethernet Device Unit Test Suite\",\n \t.setup = inline_ipsec_testsuite_setup,\n@@ -1928,6 +2205,37 @@ static struct unit_test_suite inline_ipsec_testsuite  = {\n \t\t\ttest_ipsec_inline_proto_iv_gen),\n \n \n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"Antireplay with window size 1024\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_antireplay1024,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"Antireplay with window size 2048\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_antireplay2048,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"Antireplay with window size 4096\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_antireplay4096,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"ESN and Antireplay with window size 1024\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_esn_antireplay1024,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"ESN and Antireplay with window size 2048\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_esn_antireplay2048,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"ESN and Antireplay with window size 4096\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_esn_antireplay4096,\n+\t\t\t&pkt_aes_128_gcm),\n+\n \t\tTEST_CASE_NAMED_WITH_DATA(\n \t\t\t\"IPv4 Reassembly with 2 fragments\",\n \t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n",
    "prefixes": [
        "v5",
        "6/7"
    ]
}