get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/111695/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 111695,
    "url": "http://patches.dpdk.org/api/patches/111695/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20220524072216.1283647-7-gakhil@marvell.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220524072216.1283647-7-gakhil@marvell.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220524072216.1283647-7-gakhil@marvell.com",
    "date": "2022-05-24T07:22:15",
    "name": "[v7,6/7] test/security: add ESN and anti-replay cases for inline",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "32cf1ae5d176b9f97412c429865cbcfe6a55e0ac",
    "submitter": {
        "id": 2094,
        "url": "http://patches.dpdk.org/api/people/2094/?format=api",
        "name": "Akhil Goyal",
        "email": "gakhil@marvell.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20220524072216.1283647-7-gakhil@marvell.com/mbox/",
    "series": [
        {
            "id": 23112,
            "url": "http://patches.dpdk.org/api/series/23112/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=23112",
            "date": "2022-05-24T07:22:11",
            "name": "app/test: add inline IPsec and reassembly cases",
            "version": 7,
            "mbox": "http://patches.dpdk.org/series/23112/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/111695/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/111695/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 199FCA04FF;\n\tTue, 24 May 2022 09:55:36 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 0845C40E78;\n\tTue, 24 May 2022 09:55:36 +0200 (CEST)",
            "from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com\n [67.231.148.174])\n by mails.dpdk.org (Postfix) with ESMTP id 22DBB40A84\n for <dev@dpdk.org>; Tue, 24 May 2022 09:55:32 +0200 (CEST)",
            "from pps.filterd (m0045849.ppops.net [127.0.0.1])\n by mx0a-0016f401.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id\n 24NNBS4n022572;\n Tue, 24 May 2022 00:55:32 -0700",
            "from dc5-exch02.marvell.com ([199.233.59.182])\n by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3g8kqjhjmj-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Tue, 24 May 2022 00:55:32 -0700",
            "from DC5-EXCH02.marvell.com (10.69.176.39) by DC5-EXCH02.marvell.com\n (10.69.176.39) with Microsoft SMTP Server (TLS) id 15.0.1497.18;\n Tue, 24 May 2022 00:55:30 -0700",
            "from maili.marvell.com (10.69.176.80) by DC5-EXCH02.marvell.com\n (10.69.176.39) with Microsoft SMTP Server id 15.0.1497.18 via Frontend\n Transport; Tue, 24 May 2022 00:55:30 -0700",
            "from localhost.localdomain (unknown [10.28.48.55])\n by maili.marvell.com (Postfix) with ESMTP id EB1136745F;\n Tue, 24 May 2022 00:22:42 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-transfer-encoding : content-type; s=pfpt0220;\n bh=bGRIE3MOb8sWfcQIbpAM/NVNkA/GF1kJJGLg4JONd/o=;\n b=RtA6Dry7egAryOjXmmE9FXKaqiGXU/RO/gPU/SPEV6/2NHSta5Uah7FqmMc9Eb9uYI5V\n n50v19CyEzt9xHCxQ15PX1aSJA+IVwbpgIzBrmjdyOPXTBM0QevzrMskYlPwkL8a08dt\n N2QQYcFVREYZZeB+3EiI8RWN0RyuRQGGIJFdAbuA/Xy2WSnEv/08BdtxqN44Lmhmh/5e\n +6YGu99/HEOJWuUcNbHA1nX6wNvc6KSKFk2xLsnoFJK/ArBsEXN7lrlxDK/OpOXjhvsl\n 7L5egFTyTjZG6xaTW4lJO0KyAbeCczBa/hcqlazR+4YMuHwRz2R987gWy1NX+VjT1Z40 TA==",
        "From": "Akhil Goyal <gakhil@marvell.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<thomas@monjalon.net>, <david.marchand@redhat.com>,\n <hemant.agrawal@nxp.com>, <anoobj@marvell.com>,\n <konstantin.ananyev@intel.com>, <ciara.power@intel.com>,\n <ferruh.yigit@intel.com>, <andrew.rybchenko@oktetlabs.ru>,\n <ndabilpuram@marvell.com>, <vattunuru@marvell.com>, Akhil Goyal\n <gakhil@marvell.com>, Fan Zhang <roy.fan.zhang@intel.com>",
        "Subject": "[PATCH v7 6/7] test/security: add ESN and anti-replay cases for\n inline",
        "Date": "Tue, 24 May 2022 12:52:15 +0530",
        "Message-ID": "<20220524072216.1283647-7-gakhil@marvell.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20220524072216.1283647-1-gakhil@marvell.com>",
        "References": "<20220513073201.2320812-1-gakhil@marvell.com>\n <20220524072216.1283647-1-gakhil@marvell.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-Proofpoint-ORIG-GUID": "95aqd1cQH4vW6ATJsktBnRVRALTTymyt",
        "X-Proofpoint-GUID": "95aqd1cQH4vW6ATJsktBnRVRALTTymyt",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.205,Aquarius:18.0.874,Hydra:6.0.486,FMLib:17.11.64.514\n definitions=2022-05-24_05,2022-05-23_01,2022-02-23_01",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Added cases to test anti replay for inline IPsec processing\nwith and without extended sequence number support.\n\nSigned-off-by: Akhil Goyal <gakhil@marvell.com>\nAcked-by: Fan Zhang <roy.fan.zhang@intel.com>\n---\n app/test/test_security_inline_proto.c | 311 ++++++++++++++++++++++++++\n 1 file changed, 311 insertions(+)",
    "diff": "diff --git a/app/test/test_security_inline_proto.c b/app/test/test_security_inline_proto.c\nindex ecd7d69097..518fb09113 100644\n--- a/app/test/test_security_inline_proto.c\n+++ b/app/test/test_security_inline_proto.c\n@@ -1098,6 +1098,139 @@ test_ipsec_inline_proto_all(const struct ipsec_test_flags *flags)\n \t\treturn TEST_SKIPPED;\n }\n \n+static int\n+test_ipsec_inline_proto_process_with_esn(struct ipsec_test_data td[],\n+\t\tstruct ipsec_test_data res_d[],\n+\t\tint nb_pkts,\n+\t\tbool silent,\n+\t\tconst struct ipsec_test_flags *flags)\n+{\n+\tstruct rte_security_session_conf sess_conf = {0};\n+\tstruct ipsec_test_data *res_d_tmp = NULL;\n+\tstruct rte_crypto_sym_xform cipher = {0};\n+\tstruct rte_crypto_sym_xform auth = {0};\n+\tstruct rte_crypto_sym_xform aead = {0};\n+\tstruct rte_mbuf *rx_pkt = NULL;\n+\tstruct rte_mbuf *tx_pkt = NULL;\n+\tint nb_rx, nb_sent;\n+\tstruct rte_security_session *ses;\n+\tstruct rte_security_ctx *ctx;\n+\tuint32_t ol_flags;\n+\tint i, ret;\n+\n+\tif (td[0].aead) {\n+\t\tsess_conf.crypto_xform = &aead;\n+\t} else {\n+\t\tif (td[0].ipsec_xform.direction ==\n+\t\t\t\tRTE_SECURITY_IPSEC_SA_DIR_EGRESS) {\n+\t\t\tsess_conf.crypto_xform = &cipher;\n+\t\t\tsess_conf.crypto_xform->type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\t\t\tsess_conf.crypto_xform->next = &auth;\n+\t\t\tsess_conf.crypto_xform->next->type = RTE_CRYPTO_SYM_XFORM_AUTH;\n+\t\t} else {\n+\t\t\tsess_conf.crypto_xform = &auth;\n+\t\t\tsess_conf.crypto_xform->type = RTE_CRYPTO_SYM_XFORM_AUTH;\n+\t\t\tsess_conf.crypto_xform->next = &cipher;\n+\t\t\tsess_conf.crypto_xform->next->type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\t\t}\n+\t}\n+\n+\t/* Create Inline IPsec session. */\n+\tret = create_inline_ipsec_session(&td[0], port_id, &ses, &ctx,\n+\t\t\t\t\t  &ol_flags, flags, &sess_conf);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tif (td[0].ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS) {\n+\t\tret = create_default_flow(port_id);\n+\t\tif (ret)\n+\t\t\tgoto out;\n+\t}\n+\n+\tfor (i = 0; i < nb_pkts; i++) {\n+\t\ttx_pkt = init_packet(mbufpool, td[i].input_text.data,\n+\t\t\t\t\ttd[i].input_text.len);\n+\t\tif (tx_pkt == NULL) {\n+\t\t\tret = TEST_FAILED;\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\tif (test_ipsec_pkt_update(rte_pktmbuf_mtod_offset(tx_pkt,\n+\t\t\t\t\tuint8_t *, RTE_ETHER_HDR_LEN), flags)) {\n+\t\t\tret = TEST_FAILED;\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\tif (td[i].ipsec_xform.direction ==\n+\t\t\t\tRTE_SECURITY_IPSEC_SA_DIR_EGRESS) {\n+\t\t\tif (flags->antireplay) {\n+\t\t\t\tsess_conf.ipsec.esn.value =\n+\t\t\t\t\t\ttd[i].ipsec_xform.esn.value;\n+\t\t\t\tret = rte_security_session_update(ctx, ses,\n+\t\t\t\t\t\t&sess_conf);\n+\t\t\t\tif (ret) {\n+\t\t\t\t\tprintf(\"Could not update ESN in session\\n\");\n+\t\t\t\t\trte_pktmbuf_free(tx_pkt);\n+\t\t\t\t\tret = TEST_SKIPPED;\n+\t\t\t\t\tgoto out;\n+\t\t\t\t}\n+\t\t\t}\n+\t\t\tif (ol_flags & RTE_SECURITY_TX_OLOAD_NEED_MDATA)\n+\t\t\t\trte_security_set_pkt_metadata(ctx, ses,\n+\t\t\t\t\t\ttx_pkt, NULL);\n+\t\t\ttx_pkt->ol_flags |= RTE_MBUF_F_TX_SEC_OFFLOAD;\n+\t\t}\n+\t\t/* Send packet to ethdev for inline IPsec processing. */\n+\t\tnb_sent = rte_eth_tx_burst(port_id, 0, &tx_pkt, 1);\n+\t\tif (nb_sent != 1) {\n+\t\t\tprintf(\"\\nUnable to TX packets\");\n+\t\t\trte_pktmbuf_free(tx_pkt);\n+\t\t\tret = TEST_FAILED;\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\trte_pause();\n+\n+\t\t/* Receive back packet on loopback interface. */\n+\t\tdo {\n+\t\t\trte_delay_ms(1);\n+\t\t\tnb_rx = rte_eth_rx_burst(port_id, 0, &rx_pkt, 1);\n+\t\t} while (nb_rx == 0);\n+\n+\t\trte_pktmbuf_adj(rx_pkt, RTE_ETHER_HDR_LEN);\n+\n+\t\tif (res_d != NULL)\n+\t\t\tres_d_tmp = &res_d[i];\n+\n+\t\tret = test_ipsec_post_process(rx_pkt, &td[i],\n+\t\t\t\t\t      res_d_tmp, silent, flags);\n+\t\tif (ret != TEST_SUCCESS) {\n+\t\t\trte_pktmbuf_free(rx_pkt);\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\tret = test_ipsec_stats_verify(ctx, ses, flags,\n+\t\t\t\t\ttd->ipsec_xform.direction);\n+\t\tif (ret != TEST_SUCCESS) {\n+\t\t\trte_pktmbuf_free(rx_pkt);\n+\t\t\tgoto out;\n+\t\t}\n+\n+\t\trte_pktmbuf_free(rx_pkt);\n+\t\trx_pkt = NULL;\n+\t\ttx_pkt = NULL;\n+\t}\n+\n+out:\n+\tif (td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS)\n+\t\tdestroy_default_flow(port_id);\n+\n+\t/* Destroy session so that other cases can create the session again */\n+\trte_security_session_destroy(ctx, ses);\n+\tses = NULL;\n+\n+\treturn ret;\n+}\n \n static int\n ut_setup_inline_ipsec(void)\n@@ -1709,6 +1842,153 @@ test_ipsec_inline_proto_known_vec_fragmented(const void *test_data)\n \treturn test_ipsec_inline_proto_process(&td_outb, NULL, 1, false,\n \t\t\t\t\t\t&flags);\n }\n+\n+static int\n+test_ipsec_inline_pkt_replay(const void *test_data, const uint64_t esn[],\n+\t\t      bool replayed_pkt[], uint32_t nb_pkts, bool esn_en,\n+\t\t      uint64_t winsz)\n+{\n+\tstruct ipsec_test_data td_outb[IPSEC_TEST_PACKETS_MAX];\n+\tstruct ipsec_test_data td_inb[IPSEC_TEST_PACKETS_MAX];\n+\tstruct ipsec_test_flags flags;\n+\tuint32_t i, ret = 0;\n+\n+\tmemset(&flags, 0, sizeof(flags));\n+\tflags.antireplay = true;\n+\n+\tfor (i = 0; i < nb_pkts; i++) {\n+\t\tmemcpy(&td_outb[i], test_data, sizeof(td_outb));\n+\t\ttd_outb[i].ipsec_xform.options.iv_gen_disable = 1;\n+\t\ttd_outb[i].ipsec_xform.replay_win_sz = winsz;\n+\t\ttd_outb[i].ipsec_xform.options.esn = esn_en;\n+\t}\n+\n+\tfor (i = 0; i < nb_pkts; i++)\n+\t\ttd_outb[i].ipsec_xform.esn.value = esn[i];\n+\n+\tret = test_ipsec_inline_proto_process_with_esn(td_outb, td_inb,\n+\t\t\t\tnb_pkts, true, &flags);\n+\tif (ret != TEST_SUCCESS)\n+\t\treturn ret;\n+\n+\ttest_ipsec_td_update(td_inb, td_outb, nb_pkts, &flags);\n+\n+\tfor (i = 0; i < nb_pkts; i++) {\n+\t\ttd_inb[i].ipsec_xform.options.esn = esn_en;\n+\t\t/* Set antireplay flag for packets to be dropped */\n+\t\ttd_inb[i].ar_packet = replayed_pkt[i];\n+\t}\n+\n+\tret = test_ipsec_inline_proto_process_with_esn(td_inb, NULL, nb_pkts,\n+\t\t\t\ttrue, &flags);\n+\n+\treturn ret;\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay(const void *test_data, uint64_t winsz)\n+{\n+\n+\tuint32_t nb_pkts = 5;\n+\tbool replayed_pkt[5];\n+\tuint64_t esn[5];\n+\n+\t/* 1. Advance the TOP of the window to WS * 2 */\n+\tesn[0] = winsz * 2;\n+\t/* 2. Test sequence number within the new window(WS + 1) */\n+\tesn[1] = winsz + 1;\n+\t/* 3. Test sequence number less than the window BOTTOM */\n+\tesn[2] = winsz;\n+\t/* 4. Test sequence number in the middle of the window */\n+\tesn[3] = winsz + (winsz / 2);\n+\t/* 5. Test replay of the packet in the middle of the window */\n+\tesn[4] = winsz + (winsz / 2);\n+\n+\treplayed_pkt[0] = false;\n+\treplayed_pkt[1] = false;\n+\treplayed_pkt[2] = true;\n+\treplayed_pkt[3] = false;\n+\treplayed_pkt[4] = true;\n+\n+\treturn test_ipsec_inline_pkt_replay(test_data, esn, replayed_pkt,\n+\t\t\tnb_pkts, false, winsz);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay1024(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_antireplay(test_data, 1024);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay2048(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_antireplay(test_data, 2048);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_antireplay4096(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_antireplay(test_data, 4096);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay(const void *test_data, uint64_t winsz)\n+{\n+\n+\tuint32_t nb_pkts = 7;\n+\tbool replayed_pkt[7];\n+\tuint64_t esn[7];\n+\n+\t/* Set the initial sequence number */\n+\tesn[0] = (uint64_t)(0xFFFFFFFF - winsz);\n+\t/* 1. Advance the TOP of the window to (1<<32 + WS/2) */\n+\tesn[1] = (uint64_t)((1ULL << 32) + (winsz / 2));\n+\t/* 2. Test sequence number within new window (1<<32 + WS/2 + 1) */\n+\tesn[2] = (uint64_t)((1ULL << 32) - (winsz / 2) + 1);\n+\t/* 3. Test with sequence number within window (1<<32 - 1) */\n+\tesn[3] = (uint64_t)((1ULL << 32) - 1);\n+\t/* 4. Test with sequence number within window (1<<32 - 1) */\n+\tesn[4] = (uint64_t)(1ULL << 32);\n+\t/* 5. Test with duplicate sequence number within\n+\t * new window (1<<32 - 1)\n+\t */\n+\tesn[5] = (uint64_t)((1ULL << 32) - 1);\n+\t/* 6. Test with duplicate sequence number within new window (1<<32) */\n+\tesn[6] = (uint64_t)(1ULL << 32);\n+\n+\treplayed_pkt[0] = false;\n+\treplayed_pkt[1] = false;\n+\treplayed_pkt[2] = false;\n+\treplayed_pkt[3] = false;\n+\treplayed_pkt[4] = false;\n+\treplayed_pkt[5] = true;\n+\treplayed_pkt[6] = true;\n+\n+\treturn test_ipsec_inline_pkt_replay(test_data, esn, replayed_pkt, nb_pkts,\n+\t\t\t\t     true, winsz);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay1024(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_esn_antireplay(test_data, 1024);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay2048(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_esn_antireplay(test_data, 2048);\n+}\n+\n+static int\n+test_ipsec_inline_proto_pkt_esn_antireplay4096(const void *test_data)\n+{\n+\treturn test_ipsec_inline_proto_pkt_esn_antireplay(test_data, 4096);\n+}\n+\n+\n+\n static struct unit_test_suite inline_ipsec_testsuite  = {\n \t.suite_name = \"Inline IPsec Ethernet Device Unit Test Suite\",\n \t.setup = inline_ipsec_testsuite_setup,\n@@ -1935,6 +2215,37 @@ static struct unit_test_suite inline_ipsec_testsuite  = {\n \t\t\ttest_ipsec_inline_proto_iv_gen),\n \n \n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"Antireplay with window size 1024\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_antireplay1024,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"Antireplay with window size 2048\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_antireplay2048,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"Antireplay with window size 4096\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_antireplay4096,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"ESN and Antireplay with window size 1024\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_esn_antireplay1024,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"ESN and Antireplay with window size 2048\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_esn_antireplay2048,\n+\t\t\t&pkt_aes_128_gcm),\n+\t\tTEST_CASE_NAMED_WITH_DATA(\n+\t\t\t\"ESN and Antireplay with window size 4096\",\n+\t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n+\t\t\ttest_ipsec_inline_proto_pkt_esn_antireplay4096,\n+\t\t\t&pkt_aes_128_gcm),\n+\n \t\tTEST_CASE_NAMED_WITH_DATA(\n \t\t\t\"IPv4 Reassembly with 2 fragments\",\n \t\t\tut_setup_inline_ipsec, ut_teardown_inline_ipsec,\n",
    "prefixes": [
        "v7",
        "6/7"
    ]
}