get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/65541/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 65541,
    "url": "http://patches.dpdk.org/api/patches/65541/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20200204131258.17632-8-marcinx.smoczynski@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20200204131258.17632-8-marcinx.smoczynski@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20200204131258.17632-8-marcinx.smoczynski@intel.com",
    "date": "2020-02-04T13:12:57",
    "name": "[v6,7/8] examples/ipsec-secgw: cpu crypto testing",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "47bd0b0cf2abf6c89b29edaff64bc620950f6aa2",
    "submitter": {
        "id": 1293,
        "url": "http://patches.dpdk.org/api/people/1293/?format=api",
        "name": "Marcin Smoczynski",
        "email": "marcinx.smoczynski@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20200204131258.17632-8-marcinx.smoczynski@intel.com/mbox/",
    "series": [
        {
            "id": 8413,
            "url": "http://patches.dpdk.org/api/series/8413/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=8413",
            "date": "2020-02-04T13:12:50",
            "name": "Introduce CPU crypto mode",
            "version": 6,
            "mbox": "http://patches.dpdk.org/series/8413/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/65541/comments/",
    "check": "fail",
    "checks": "http://patches.dpdk.org/api/patches/65541/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 0C981A0534;\n\tTue,  4 Feb 2020 14:14:23 +0100 (CET)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 77ED71C1D0;\n\tTue,  4 Feb 2020 14:13:22 +0100 (CET)",
            "from mga07.intel.com (mga07.intel.com [134.134.136.100])\n by dpdk.org (Postfix) with ESMTP id 63C791C1CE\n for <dev@dpdk.org>; Tue,  4 Feb 2020 14:13:20 +0100 (CET)",
            "from fmsmga005.fm.intel.com ([10.253.24.32])\n by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n 04 Feb 2020 05:13:19 -0800",
            "from msmoczyx-mobl.ger.corp.intel.com ([10.103.102.190])\n by fmsmga005.fm.intel.com with ESMTP; 04 Feb 2020 05:13:18 -0800"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.70,401,1574150400\"; d=\"scan'208\";a=\"429800458\"",
        "From": "Marcin Smoczynski <marcinx.smoczynski@intel.com>",
        "To": "akhil.goyal@nxp.com, konstantin.ananyev@intel.com,\n roy.fan.zhang@intel.com,\n declan.doherty@intel.com, radu.nicolau@intel.com,\n pablo.de.lara.guarch@intel.com",
        "Cc": "dev@dpdk.org,\n\tMarcin Smoczynski <marcinx.smoczynski@intel.com>",
        "Date": "Tue,  4 Feb 2020 14:12:57 +0100",
        "Message-Id": "<20200204131258.17632-8-marcinx.smoczynski@intel.com>",
        "X-Mailer": "git-send-email 2.21.0.windows.1",
        "In-Reply-To": "<20200204131258.17632-1-marcinx.smoczynski@intel.com>",
        "References": "<20200128142220.16644-1-marcinx.smoczynski@intel.com>\n <20200204131258.17632-1-marcinx.smoczynski@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Subject": "[dpdk-dev] [PATCH v6 7/8] examples/ipsec-secgw: cpu crypto testing",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Enable cpu-crypto mode testing by adding dedicated environmental\nvariable CRYPTO_PRIM_TYPE. Setting it to 'type cpu-crypto' allows\nto run test scenario with cpu crypto acceleration.\n\nSigned-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com>\nSigned-off-by: Marcin Smoczynski <marcinx.smoczynski@intel.com>\nAcked-by: Fan Zhang <roy.fan.zhang@intel.com>\n---\n examples/ipsec-secgw/test/common_defs.sh      | 21 +++++++++++++++++++\n examples/ipsec-secgw/test/linux_test4.sh      | 11 +---------\n examples/ipsec-secgw/test/linux_test6.sh      | 11 +---------\n .../test/trs_3descbc_sha1_common_defs.sh      |  8 +++----\n .../test/trs_aescbc_sha1_common_defs.sh       |  8 +++----\n .../test/trs_aesctr_sha1_common_defs.sh       |  8 +++----\n .../test/tun_3descbc_sha1_common_defs.sh      |  8 +++----\n .../test/tun_aescbc_sha1_common_defs.sh       |  8 +++----\n .../test/tun_aesctr_sha1_common_defs.sh       |  8 +++----\n 9 files changed, 47 insertions(+), 44 deletions(-)",
    "diff": "diff --git a/examples/ipsec-secgw/test/common_defs.sh b/examples/ipsec-secgw/test/common_defs.sh\nindex 4aac4981a..6b6ae06f3 100644\n--- a/examples/ipsec-secgw/test/common_defs.sh\n+++ b/examples/ipsec-secgw/test/common_defs.sh\n@@ -42,6 +42,27 @@ DPDK_BUILD=${RTE_TARGET:-x86_64-native-linux-gcc}\n DEF_MTU_LEN=1400\n DEF_PING_LEN=1200\n \n+#upsate operation mode based on env vars values\n+select_mode()\n+{\n+\t# select sync/async mode\n+\tif [[ -n \"${CRYPTO_PRIM_TYPE}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n+\t\techo \"${CRYPTO_PRIM_TYPE} is enabled\"\n+\t\tSGW_CFG_XPRM=\"${SGW_CFG_XPRM} ${CRYPTO_PRIM_TYPE}\"\n+\tfi\n+\n+\t#make linux to generate fragmented packets\n+\tif [[ -n \"${MULTI_SEG_TEST}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n+\t\techo \"multi-segment test is enabled\"\n+\t\tSGW_CMD_XPRM=\"${SGW_CMD_XPRM} ${MULTI_SEG_TEST}\"\n+\t\tPING_LEN=5000\n+\t\tMTU_LEN=1500\n+\telse\n+\t\tPING_LEN=${DEF_PING_LEN}\n+\t\tMTU_LEN=${DEF_MTU_LEN}\n+\tfi\n+}\n+\n #setup mtu on local iface\n set_local_mtu()\n {\ndiff --git a/examples/ipsec-secgw/test/linux_test4.sh b/examples/ipsec-secgw/test/linux_test4.sh\nindex 760451000..fb8ae1023 100644\n--- a/examples/ipsec-secgw/test/linux_test4.sh\n+++ b/examples/ipsec-secgw/test/linux_test4.sh\n@@ -45,16 +45,7 @@ MODE=$1\n  . ${DIR}/common_defs.sh\n  . ${DIR}/${MODE}_defs.sh\n \n-#make linux to generate fragmented packets\n-if [[ -n \"${MULTI_SEG_TEST}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n-\techo \"multi-segment test is enabled\"\n-\tSGW_CMD_XPRM=\"${SGW_CMD_XPRM} ${MULTI_SEG_TEST}\"\n-\tPING_LEN=5000\n-\tMTU_LEN=1500\n-else\n-\tPING_LEN=${DEF_PING_LEN}\n-\tMTU_LEN=${DEF_MTU_LEN}\n-fi\n+select_mode\n \n config_secgw\n \ndiff --git a/examples/ipsec-secgw/test/linux_test6.sh b/examples/ipsec-secgw/test/linux_test6.sh\nindex 479f29be3..dbcca7936 100644\n--- a/examples/ipsec-secgw/test/linux_test6.sh\n+++ b/examples/ipsec-secgw/test/linux_test6.sh\n@@ -46,16 +46,7 @@ MODE=$1\n  . ${DIR}/common_defs.sh\n  . ${DIR}/${MODE}_defs.sh\n \n-#make linux to generate fragmented packets\n-if [[ -n \"${MULTI_SEG_TEST}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n-\techo \"multi-segment test is enabled\"\n-\tSGW_CMD_XPRM=\"${SGW_CMD_XPRM} ${MULTI_SEG_TEST}\"\n-\tPING_LEN=5000\n-\tMTU_LEN=1500\n-else\n-\tPING_LEN=${DEF_PING_LEN}\n-\tMTU_LEN=${DEF_MTU_LEN}\n-fi\n+select_mode\n \n config_secgw\n \ndiff --git a/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh\nindex 3c5c18afd..62118bb3f 100644\n--- a/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh\n@@ -33,14 +33,14 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo 3des-cbc \\\n cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo 3des-cbc \\\n@@ -48,7 +48,7 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 9 cipher_algo 3des-cbc \\\n@@ -56,7 +56,7 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\nindex 9dbdd1765..7ddeb2b5a 100644\n--- a/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\n@@ -32,27 +32,27 @@ sa in 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh b/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh\nindex 6aba680f9..f0178355a 100644\n--- a/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh\n@@ -32,27 +32,27 @@ sa in 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh\nindex 7c3226f84..d8869fad0 100644\n--- a/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh\n@@ -33,14 +33,14 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4}\n+mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo 3des-cbc \\\n cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6}\n+mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo 3des-cbc \\\n@@ -48,14 +48,14 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4}\n+mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4} ${SGW_CFG_XPRM}\n \n sa out 9 cipher_algo 3des-cbc \\\n cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6}\n+mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6} ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\nindex bdf5938a0..2616926b2 100644\n--- a/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\n@@ -32,26 +32,26 @@ sa in 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4}\n+mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6}\n+mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4}\n+mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4} ${SGW_CFG_XPRM}\n \n sa out 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6}\n+mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6} ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh b/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh\nindex 06f2ef0c6..06b561fd7 100644\n--- a/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh\n@@ -32,26 +32,26 @@ sa in 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4}\n+mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6}\n+mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4}\n+mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4} ${SGW_CFG_XPRM}\n \n sa out 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6}\n+mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6} ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\n",
    "prefixes": [
        "v6",
        "7/8"
    ]
}