Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/65541/?format=api
http://patches.dpdk.org/api/patches/65541/?format=api", "web_url": "http://patches.dpdk.org/project/dpdk/patch/20200204131258.17632-8-marcinx.smoczynski@intel.com/", "project": { "id": 1, "url": "http://patches.dpdk.org/api/projects/1/?format=api", "name": "DPDK", "link_name": "dpdk", "list_id": "dev.dpdk.org", "list_email": "dev@dpdk.org", "web_url": "http://core.dpdk.org", "scm_url": "git://dpdk.org/dpdk", "webscm_url": "http://git.dpdk.org/dpdk", "list_archive_url": "https://inbox.dpdk.org/dev", "list_archive_url_format": "https://inbox.dpdk.org/dev/{}", "commit_url_format": "" }, "msgid": "<20200204131258.17632-8-marcinx.smoczynski@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dev/20200204131258.17632-8-marcinx.smoczynski@intel.com", "date": "2020-02-04T13:12:57", "name": "[v6,7/8] examples/ipsec-secgw: cpu crypto testing", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": true, "hash": "47bd0b0cf2abf6c89b29edaff64bc620950f6aa2", "submitter": { "id": 1293, "url": "http://patches.dpdk.org/api/people/1293/?format=api", "name": "Marcin Smoczynski", "email": "marcinx.smoczynski@intel.com" }, "delegate": { "id": 6690, "url": "http://patches.dpdk.org/api/users/6690/?format=api", "username": "akhil", "first_name": "akhil", "last_name": "goyal", "email": "gakhil@marvell.com" }, "mbox": "http://patches.dpdk.org/project/dpdk/patch/20200204131258.17632-8-marcinx.smoczynski@intel.com/mbox/", "series": [ { "id": 8413, "url": "http://patches.dpdk.org/api/series/8413/?format=api", "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=8413", "date": "2020-02-04T13:12:50", "name": "Introduce CPU crypto mode", "version": 6, "mbox": "http://patches.dpdk.org/series/8413/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/65541/comments/", "check": "fail", "checks": "http://patches.dpdk.org/api/patches/65541/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dev-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 0C981A0534;\n\tTue, 4 Feb 2020 14:14:23 +0100 (CET)", "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 77ED71C1D0;\n\tTue, 4 Feb 2020 14:13:22 +0100 (CET)", "from mga07.intel.com (mga07.intel.com [134.134.136.100])\n by dpdk.org (Postfix) with ESMTP id 63C791C1CE\n for <dev@dpdk.org>; Tue, 4 Feb 2020 14:13:20 +0100 (CET)", "from fmsmga005.fm.intel.com ([10.253.24.32])\n by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n 04 Feb 2020 05:13:19 -0800", "from msmoczyx-mobl.ger.corp.intel.com ([10.103.102.190])\n by fmsmga005.fm.intel.com with ESMTP; 04 Feb 2020 05:13:18 -0800" ], "X-Amp-Result": "SKIPPED(no attachment in message)", "X-Amp-File-Uploaded": "False", "X-ExtLoop1": "1", "X-IronPort-AV": "E=Sophos;i=\"5.70,401,1574150400\"; d=\"scan'208\";a=\"429800458\"", "From": "Marcin Smoczynski <marcinx.smoczynski@intel.com>", "To": "akhil.goyal@nxp.com, konstantin.ananyev@intel.com,\n roy.fan.zhang@intel.com,\n declan.doherty@intel.com, radu.nicolau@intel.com,\n pablo.de.lara.guarch@intel.com", "Cc": "dev@dpdk.org,\n\tMarcin Smoczynski <marcinx.smoczynski@intel.com>", "Date": "Tue, 4 Feb 2020 14:12:57 +0100", "Message-Id": "<20200204131258.17632-8-marcinx.smoczynski@intel.com>", "X-Mailer": "git-send-email 2.21.0.windows.1", "In-Reply-To": "<20200204131258.17632-1-marcinx.smoczynski@intel.com>", "References": "<20200128142220.16644-1-marcinx.smoczynski@intel.com>\n <20200204131258.17632-1-marcinx.smoczynski@intel.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Subject": "[dpdk-dev] [PATCH v6 7/8] examples/ipsec-secgw: cpu crypto testing", "X-BeenThere": "dev@dpdk.org", "X-Mailman-Version": "2.1.15", "Precedence": "list", "List-Id": "DPDK patches and discussions <dev.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dev/>", "List-Post": "<mailto:dev@dpdk.org>", "List-Help": "<mailto:dev-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>", "Errors-To": "dev-bounces@dpdk.org", "Sender": "\"dev\" <dev-bounces@dpdk.org>" }, "content": "Enable cpu-crypto mode testing by adding dedicated environmental\nvariable CRYPTO_PRIM_TYPE. Setting it to 'type cpu-crypto' allows\nto run test scenario with cpu crypto acceleration.\n\nSigned-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com>\nSigned-off-by: Marcin Smoczynski <marcinx.smoczynski@intel.com>\nAcked-by: Fan Zhang <roy.fan.zhang@intel.com>\n---\n examples/ipsec-secgw/test/common_defs.sh | 21 +++++++++++++++++++\n examples/ipsec-secgw/test/linux_test4.sh | 11 +---------\n examples/ipsec-secgw/test/linux_test6.sh | 11 +---------\n .../test/trs_3descbc_sha1_common_defs.sh | 8 +++----\n .../test/trs_aescbc_sha1_common_defs.sh | 8 +++----\n .../test/trs_aesctr_sha1_common_defs.sh | 8 +++----\n .../test/tun_3descbc_sha1_common_defs.sh | 8 +++----\n .../test/tun_aescbc_sha1_common_defs.sh | 8 +++----\n .../test/tun_aesctr_sha1_common_defs.sh | 8 +++----\n 9 files changed, 47 insertions(+), 44 deletions(-)", "diff": "diff --git a/examples/ipsec-secgw/test/common_defs.sh b/examples/ipsec-secgw/test/common_defs.sh\nindex 4aac4981a..6b6ae06f3 100644\n--- a/examples/ipsec-secgw/test/common_defs.sh\n+++ b/examples/ipsec-secgw/test/common_defs.sh\n@@ -42,6 +42,27 @@ DPDK_BUILD=${RTE_TARGET:-x86_64-native-linux-gcc}\n DEF_MTU_LEN=1400\n DEF_PING_LEN=1200\n \n+#upsate operation mode based on env vars values\n+select_mode()\n+{\n+\t# select sync/async mode\n+\tif [[ -n \"${CRYPTO_PRIM_TYPE}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n+\t\techo \"${CRYPTO_PRIM_TYPE} is enabled\"\n+\t\tSGW_CFG_XPRM=\"${SGW_CFG_XPRM} ${CRYPTO_PRIM_TYPE}\"\n+\tfi\n+\n+\t#make linux to generate fragmented packets\n+\tif [[ -n \"${MULTI_SEG_TEST}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n+\t\techo \"multi-segment test is enabled\"\n+\t\tSGW_CMD_XPRM=\"${SGW_CMD_XPRM} ${MULTI_SEG_TEST}\"\n+\t\tPING_LEN=5000\n+\t\tMTU_LEN=1500\n+\telse\n+\t\tPING_LEN=${DEF_PING_LEN}\n+\t\tMTU_LEN=${DEF_MTU_LEN}\n+\tfi\n+}\n+\n #setup mtu on local iface\n set_local_mtu()\n {\ndiff --git a/examples/ipsec-secgw/test/linux_test4.sh b/examples/ipsec-secgw/test/linux_test4.sh\nindex 760451000..fb8ae1023 100644\n--- a/examples/ipsec-secgw/test/linux_test4.sh\n+++ b/examples/ipsec-secgw/test/linux_test4.sh\n@@ -45,16 +45,7 @@ MODE=$1\n . ${DIR}/common_defs.sh\n . ${DIR}/${MODE}_defs.sh\n \n-#make linux to generate fragmented packets\n-if [[ -n \"${MULTI_SEG_TEST}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n-\techo \"multi-segment test is enabled\"\n-\tSGW_CMD_XPRM=\"${SGW_CMD_XPRM} ${MULTI_SEG_TEST}\"\n-\tPING_LEN=5000\n-\tMTU_LEN=1500\n-else\n-\tPING_LEN=${DEF_PING_LEN}\n-\tMTU_LEN=${DEF_MTU_LEN}\n-fi\n+select_mode\n \n config_secgw\n \ndiff --git a/examples/ipsec-secgw/test/linux_test6.sh b/examples/ipsec-secgw/test/linux_test6.sh\nindex 479f29be3..dbcca7936 100644\n--- a/examples/ipsec-secgw/test/linux_test6.sh\n+++ b/examples/ipsec-secgw/test/linux_test6.sh\n@@ -46,16 +46,7 @@ MODE=$1\n . ${DIR}/common_defs.sh\n . ${DIR}/${MODE}_defs.sh\n \n-#make linux to generate fragmented packets\n-if [[ -n \"${MULTI_SEG_TEST}\" && -n \"${SGW_CMD_XPRM}\" ]]; then\n-\techo \"multi-segment test is enabled\"\n-\tSGW_CMD_XPRM=\"${SGW_CMD_XPRM} ${MULTI_SEG_TEST}\"\n-\tPING_LEN=5000\n-\tMTU_LEN=1500\n-else\n-\tPING_LEN=${DEF_PING_LEN}\n-\tMTU_LEN=${DEF_MTU_LEN}\n-fi\n+select_mode\n \n config_secgw\n \ndiff --git a/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh\nindex 3c5c18afd..62118bb3f 100644\n--- a/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh\n@@ -33,14 +33,14 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo 3des-cbc \\\n cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo 3des-cbc \\\n@@ -48,7 +48,7 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 9 cipher_algo 3des-cbc \\\n@@ -56,7 +56,7 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\nindex 9dbdd1765..7ddeb2b5a 100644\n--- a/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\n@@ -32,27 +32,27 @@ sa in 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh b/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh\nindex 6aba680f9..f0178355a 100644\n--- a/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh\n@@ -32,27 +32,27 @@ sa in 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode transport\n+mode transport ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh\nindex 7c3226f84..d8869fad0 100644\n--- a/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh\n@@ -33,14 +33,14 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4}\n+mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo 3des-cbc \\\n cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6}\n+mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo 3des-cbc \\\n@@ -48,14 +48,14 @@ cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4}\n+mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4} ${SGW_CFG_XPRM}\n \n sa out 9 cipher_algo 3des-cbc \\\n cipher_key \\\n de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6}\n+mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6} ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh b/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\nindex bdf5938a0..2616926b2 100644\n--- a/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\n@@ -32,26 +32,26 @@ sa in 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4}\n+mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6}\n+mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4}\n+mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4} ${SGW_CFG_XPRM}\n \n sa out 9 cipher_algo aes-128-cbc \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6}\n+mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6} ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\ndiff --git a/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh b/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh\nindex 06f2ef0c6..06b561fd7 100644\n--- a/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh\n+++ b/examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh\n@@ -32,26 +32,26 @@ sa in 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4}\n+mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM}\n \n sa in 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6}\n+mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM}\n \n #SA out rules\n sa out 7 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4}\n+mode ipv4-tunnel src ${LOCAL_IPV4} dst ${REMOTE_IPV4} ${SGW_CFG_XPRM}\n \n sa out 9 cipher_algo aes-128-ctr \\\n cipher_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n auth_algo sha1-hmac \\\n auth_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \\\n-mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6}\n+mode ipv6-tunnel src ${LOCAL_IPV6} dst ${REMOTE_IPV6} ${SGW_CFG_XPRM}\n \n #Routing rules\n rt ipv4 dst ${REMOTE_IPV4}/32 port 0\n", "prefixes": [ "v6", "7/8" ] }{ "id": 65541, "url": "