get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/16193/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 16193,
    "url": "http://patches.dpdk.org/api/patches/16193/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1475063643-6152-1-git-send-email-arkadiuszx.kusztal@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1475063643-6152-1-git-send-email-arkadiuszx.kusztal@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1475063643-6152-1-git-send-email-arkadiuszx.kusztal@intel.com",
    "date": "2016-09-28T11:54:03",
    "name": "[dpdk-dev,v4] app/test: add AES GCM performance test to cryptodev",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "4062b726e98985c77b71fc6b706a373173cb1955",
    "submitter": {
        "id": 452,
        "url": "http://patches.dpdk.org/api/people/452/?format=api",
        "name": "Arkadiusz Kusztal",
        "email": "arkadiuszx.kusztal@intel.com"
    },
    "delegate": {
        "id": 22,
        "url": "http://patches.dpdk.org/api/users/22/?format=api",
        "username": "pdelarag",
        "first_name": "Pablo",
        "last_name": "de Lara Guarch",
        "email": "pablo.de.lara.guarch@intel.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1475063643-6152-1-git-send-email-arkadiuszx.kusztal@intel.com/mbox/",
    "series": [],
    "comments": "http://patches.dpdk.org/api/patches/16193/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/16193/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [IPv6:::1])\n\tby dpdk.org (Postfix) with ESMTP id 477365679;\n\tWed, 28 Sep 2016 13:54:15 +0200 (CEST)",
            "from mga06.intel.com (mga06.intel.com [134.134.136.31])\n\tby dpdk.org (Postfix) with ESMTP id 421EB5597\n\tfor <dev@dpdk.org>; Wed, 28 Sep 2016 13:54:12 +0200 (CEST)",
            "from orsmga003.jf.intel.com ([10.7.209.27])\n\tby orsmga104.jf.intel.com with ESMTP; 28 Sep 2016 04:54:11 -0700",
            "from sivswdev03.ir.intel.com (HELO localhost.localdomain)\n\t([10.237.217.157])\n\tby orsmga003.jf.intel.com with ESMTP; 28 Sep 2016 04:54:09 -0700"
        ],
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.30,409,1470726000\"; d=\"scan'208\";a=\"884654022\"",
        "From": "Arek Kusztal <arkadiuszx.kusztal@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "fiona.trahe@intel.com, deepak.k.jain@intel.com,\n\tpablo.de.lara.guarch@intel.com, john.griffin@intel.com,\n\tArek Kusztal <arkadiuszx.kusztal@intel.com>",
        "Date": "Wed, 28 Sep 2016 12:54:03 +0100",
        "Message-Id": "<1475063643-6152-1-git-send-email-arkadiuszx.kusztal@intel.com>",
        "X-Mailer": "git-send-email 1.7.0.7",
        "Subject": "[dpdk-dev] [PATCH v4] app/test: add AES GCM performance test to\n\tcryptodev",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "patches and discussions about DPDK <dev.dpdk.org>",
        "List-Unsubscribe": "<http://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<http://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch adds AES Galois Counter Mode performance test case\nfor cryptodev QAT and AESNI GCM. Test is performed with different\nbuffer sizes, burst size of 32 and 128b key. Test vectors\nare placed in app/test/test_cryptodev_perf_vectors.h file.\n\nSigned-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com>\n---\nThis patch depends on the following patches/patchsets:\n\n\"app/test: fix linkage scope of gmac plaintext array\"\n(http://dpdk.org/dev/patchwork/patch/16023/)\n\nv2:\n  * Fixed 32b build problem in test_cryptodev_perf.c\nv3:\n  * Added multiple test cases possibility\n  * Added AESNI GCM test suite\nv4:\n  * Fixed indentation problem\n---\n app/test/test_cryptodev_gcm_test_vectors.h | 632 +++++++++++++++++++++++++++++\n app/test/test_cryptodev_perf.c             | 482 +++++++++++++++++++++-\n 2 files changed, 1111 insertions(+), 3 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev_gcm_test_vectors.h b/app/test/test_cryptodev_gcm_test_vectors.h\nindex f3f8bd3..deca09d 100644\n--- a/app/test/test_cryptodev_gcm_test_vectors.h\n+++ b/app/test/test_cryptodev_gcm_test_vectors.h\n@@ -569,4 +569,636 @@ static const struct gmac_test_data gmac_test_case_3 = {\n \t},\n };\n \n+/******* GCM PERF VECTORS ***********/\n+\n+struct cryptodev_perf_test_data {\n+\tstruct {\n+\t\tuint8_t data[64];\n+\t\tunsigned len;\n+\t} key;\n+\n+\tstruct {\n+\t\tuint8_t data[64] __rte_aligned(16);\n+\t\tunsigned len;\n+\t} iv;\n+\n+\tstruct {\n+\t\tuint8_t data[64];\n+\t\tunsigned len;\n+\t} aad;\n+\n+\tstruct {\n+\t\tuint8_t data[2048];\n+\t\tunsigned len;\n+\t} plaintext;\n+\n+\tstruct {\n+\t\tuint8_t data[2048];\n+\t\tunsigned len;\n+\t} ciphertext;\n+\n+\tstruct {\n+\t\tuint8_t data[16];\n+\t\tunsigned len;\n+\t} auth_tag;\n+\n+\tstruct {\n+\t\tuint32_t size;\n+\t\tuint8_t data[16];\n+\t\tunsigned len;\n+\t} auth_tags[7];\n+\n+};\n+\n+/* 2048B */\n+static const struct cryptodev_perf_test_data AES_GCM_128_12IV_0AAD = {\n+\t.key = {\n+\t\t.data = {\n+\t\t\t0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,\n+\t\t\t0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 },\n+\t\t.len = 16\n+\t},\n+\t.iv = {\n+\t\t.data = {\n+\t\t\t0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad,\n+\t\t\t0xde, 0xca, 0xf8, 0x88 },\n+\t\t.len = 12\n+\t},\n+\t.aad = {\n+\t\t.data = { 0 },\n+\t\t.len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = {\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55,\n+\t\t    0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,\n+\t\t    0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,\n+\t\t    0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,\n+\t\t    0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,\n+\t\t    0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,\n+\t\t    0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,\n+\t\t    0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,\n+\t\t    0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55\n+\t\t},\n+\t\t.len = 2048\n+\t},\n+\t.ciphertext = {\n+\t\t.data = {\n+\t\t    0x42, 0x83, 0x1E, 0xC2, 0x21, 0x77, 0x74, 0x24,\n+\t\t    0x4B, 0x72, 0x21, 0xB7, 0x84, 0xD0, 0xD4, 0x9C,\n+\t\t    0xE3, 0xAA, 0x21, 0x2F, 0x2C, 0x02, 0xA4, 0xE0,\n+\t\t    0x35, 0xC1, 0x7E, 0x23, 0x29, 0xAC, 0xA1, 0x2E,\n+\t\t    0x21, 0xD5, 0x14, 0xB2, 0x54, 0x66, 0x93, 0x1C,\n+\t\t    0x7D, 0x8F, 0x6A, 0x5A, 0xAC, 0x84, 0xAA, 0x05,\n+\t\t    0x1B, 0xA3, 0x0B, 0x39, 0x6A, 0x0A, 0xAC, 0x97,\n+\t\t    0x3D, 0x58, 0xE0, 0x91, 0x47, 0x3F, 0x59, 0x85,\n+\t\t    0x04, 0x99, 0x55, 0xE1, 0x36, 0x76, 0xB7, 0x14,\n+\t\t    0x1D, 0xF0, 0xF6, 0x8C, 0x65, 0xD5, 0xAD, 0xFB,\n+\t\t    0x90, 0x7F, 0x5D, 0xA2, 0xD6, 0xFD, 0xD0, 0xE5,\n+\t\t    0x0D, 0x9B, 0x68, 0x21, 0x49, 0x42, 0x6E, 0x13,\n+\t\t    0xEC, 0x22, 0x50, 0x2A, 0x30, 0x47, 0x49, 0xA1,\n+\t\t    0x7F, 0xC3, 0x09, 0xE0, 0x56, 0x91, 0xC4, 0x54,\n+\t\t    0x70, 0xD7, 0x19, 0x40, 0xCA, 0x6B, 0x65, 0x27,\n+\t\t    0x3E, 0xE9, 0xD1, 0x0F, 0x1C, 0xB5, 0x45, 0x0D,\n+\t\t    0x27, 0xE7, 0xCF, 0x94, 0x10, 0xBF, 0xA2, 0xFA,\n+\t\t    0x86, 0x20, 0x3F, 0x6E, 0xE9, 0x95, 0x03, 0x5A,\n+\t\t    0x46, 0x11, 0x75, 0xD5, 0x37, 0x71, 0x7F, 0xE0,\n+\t\t    0xBC, 0x9F, 0xC8, 0xE9, 0xB1, 0x08, 0x2C, 0x59,\n+\t\t    0x6E, 0x51, 0x4A, 0x83, 0x38, 0xC1, 0xED, 0xE2,\n+\t\t    0x2E, 0x88, 0x90, 0xA5, 0x7D, 0xA4, 0x93, 0x9A,\n+\t\t    0x30, 0xD6, 0x96, 0x34, 0x0F, 0xC4, 0xD1, 0x7E,\n+\t\t    0xC9, 0x8F, 0xC5, 0xBB, 0x80, 0x50, 0x85, 0x75,\n+\t\t    0x7D, 0x82, 0x36, 0xDB, 0x62, 0x15, 0xAF, 0x4B,\n+\t\t    0x0A, 0x9D, 0xCD, 0x64, 0x00, 0xAB, 0x88, 0x28,\n+\t\t    0xA8, 0x35, 0x17, 0x70, 0x6F, 0x47, 0x44, 0xCD,\n+\t\t    0x65, 0xAE, 0xD5, 0x05, 0x0A, 0xA8, 0x2F, 0x48,\n+\t\t    0xAC, 0xA1, 0x72, 0x64, 0x1C, 0x7E, 0xD3, 0xF5,\n+\t\t    0xD8, 0x4E, 0x73, 0x17, 0x0C, 0xE5, 0x9F, 0xB6,\n+\t\t    0x00, 0xFA, 0xD7, 0x2C, 0x3D, 0x6A, 0x10, 0x47,\n+\t\t    0x7C, 0xF2, 0x6B, 0x13, 0x10, 0x8A, 0x76, 0x39,\n+\t\t    0xF8, 0x50, 0x33, 0xAC, 0x08, 0x1D, 0xA3, 0x48,\n+\t\t    0xE1, 0xD0, 0x05, 0x49, 0xB7, 0x76, 0x03, 0x72,\n+\t\t    0x07, 0xC5, 0xD3, 0x08, 0x79, 0x38, 0x66, 0xC1,\n+\t\t    0x52, 0xAF, 0x83, 0xCD, 0xF3, 0x86, 0x62, 0xBF,\n+\t\t    0x92, 0x24, 0x97, 0xBD, 0x5D, 0x7D, 0x81, 0x56,\n+\t\t    0x4C, 0xF3, 0xD2, 0x60, 0xC2, 0xDE, 0x61, 0xC1,\n+\t\t    0x39, 0x61, 0xDA, 0x07, 0x50, 0xC7, 0x98, 0x63,\n+\t\t    0x7E, 0xDD, 0x54, 0xCA, 0xDE, 0x12, 0xD2, 0xA8,\n+\t\t    0x19, 0x08, 0x6E, 0xF9, 0xFA, 0x6F, 0x58, 0x97,\n+\t\t    0xD4, 0x0B, 0x5C, 0x5B, 0xE5, 0x30, 0xE5, 0x4C,\n+\t\t    0x0E, 0x16, 0x87, 0xF0, 0x2C, 0xCB, 0x53, 0xB8,\n+\t\t    0x0C, 0xE5, 0xDF, 0x16, 0x7B, 0xE8, 0xC2, 0xCF,\n+\t\t    0xCC, 0xFF, 0x51, 0x24, 0xC1, 0xDD, 0x59, 0x9C,\n+\t\t    0xA7, 0x56, 0x03, 0xB9, 0x0A, 0x37, 0xA2, 0xAC,\n+\t\t    0x28, 0x8B, 0xEB, 0x51, 0x4E, 0xF1, 0xAE, 0xB5,\n+\t\t    0xC8, 0xB5, 0xCB, 0x8D, 0x23, 0xF6, 0x24, 0x2D,\n+\t\t    0xF6, 0x59, 0x62, 0xC0, 0xCB, 0xD3, 0x18, 0xE4,\n+\t\t    0xB7, 0x73, 0xEF, 0xDB, 0x13, 0x9A, 0xF5, 0xD3,\n+\t\t    0xD5, 0x61, 0x01, 0x14, 0xA5, 0xE5, 0x0D, 0x27,\n+\t\t    0xC9, 0xA5, 0x08, 0x1C, 0x60, 0xBA, 0x73, 0xFF,\n+\t\t    0xA9, 0xE0, 0x27, 0x86, 0x3F, 0xF7, 0x15, 0x03,\n+\t\t    0x69, 0xA7, 0x2B, 0x57, 0xAC, 0xA6, 0x70, 0x55,\n+\t\t    0xE9, 0xB5, 0x3F, 0xEB, 0x6F, 0xCE, 0x8A, 0xA1,\n+\t\t    0x9D, 0x8B, 0x84, 0xF1, 0x7C, 0xD0, 0x35, 0x21,\n+\t\t    0x91, 0x3D, 0x3D, 0x6E, 0x83, 0xFC, 0x45, 0x36,\n+\t\t    0x93, 0xDA, 0x66, 0xDF, 0x1A, 0x59, 0x22, 0xA5,\n+\t\t    0xC4, 0x99, 0x9B, 0xF8, 0x48, 0x9A, 0x50, 0x09,\n+\t\t    0xAB, 0xAE, 0x56, 0xB6, 0x49, 0x02, 0x3E, 0x90,\n+\t\t    0xB6, 0x07, 0x7E, 0xA7, 0x6A, 0x0A, 0xB5, 0x85,\n+\t\t    0x31, 0x0D, 0x84, 0xD4, 0x01, 0xE4, 0x48, 0x63,\n+\t\t    0xF3, 0xC1, 0x54, 0x65, 0xA6, 0x4C, 0x8B, 0x33,\n+\t\t    0xF9, 0x70, 0x59, 0x3B, 0xA6, 0xF6, 0x2B, 0x66,\n+\t\t    0xC5, 0xD2, 0xEB, 0xAB, 0x67, 0xD2, 0xE3, 0x78,\n+\t\t    0xA9, 0x1A, 0x4C, 0x99, 0xA9, 0xA6, 0xCA, 0xF7,\n+\t\t    0x65, 0xF0, 0x48, 0xF8, 0x2A, 0xEA, 0x96, 0x9F,\n+\t\t    0xC4, 0x50, 0x9A, 0x0C, 0xB6, 0x0D, 0x8A, 0x2F,\n+\t\t    0xC3, 0x99, 0x4E, 0xA0, 0x06, 0x4D, 0xAB, 0x25,\n+\t\t    0x2E, 0x44, 0x47, 0xB6, 0x98, 0xF1, 0x2C, 0x96,\n+\t\t    0x54, 0x51, 0x12, 0x41, 0x0D, 0xEF, 0x32, 0x9A,\n+\t\t    0x4A, 0xBD, 0xA2, 0x26, 0x53, 0xA8, 0xFD, 0x8B,\n+\t\t    0x6C, 0x95, 0x0A, 0x1A, 0x96, 0xEF, 0x3C, 0x85,\n+\t\t    0x34, 0x4E, 0x25, 0x9E, 0x1C, 0x67, 0x33, 0x8A,\n+\t\t    0xFF, 0x6D, 0x98, 0x93, 0x3D, 0x3F, 0x49, 0x6B,\n+\t\t    0xBF, 0x7C, 0x4F, 0x63, 0x5D, 0x62, 0x64, 0x67,\n+\t\t    0x0D, 0x07, 0x7F, 0x24, 0x4A, 0x23, 0xBC, 0x35,\n+\t\t    0xE0, 0x92, 0x6F, 0x51, 0xE7, 0x25, 0x97, 0xB9,\n+\t\t    0x14, 0x35, 0x2B, 0x48, 0xAC, 0x6F, 0x54, 0xDF,\n+\t\t    0xF2, 0xB4, 0xB0, 0xE0, 0xD3, 0x28, 0x0D, 0x66,\n+\t\t    0x46, 0x28, 0x0A, 0x16, 0x9C, 0x87, 0x73, 0xB7,\n+\t\t    0x9C, 0x2B, 0xB5, 0x43, 0xC9, 0x46, 0xB9, 0x1F,\n+\t\t    0x5F, 0x3C, 0x45, 0x03, 0x4B, 0xBF, 0x44, 0x4D,\n+\t\t    0xE1, 0x44, 0xDA, 0x54, 0xC5, 0x32, 0x3A, 0xFA,\n+\t\t    0x21, 0x5C, 0xAD, 0xD5, 0x1E, 0x1B, 0x54, 0x7C,\n+\t\t    0x9F, 0xEA, 0x92, 0x8C, 0xEA, 0x69, 0xC0, 0xCE,\n+\t\t    0xDA, 0x09, 0xAD, 0x95, 0xA0, 0x8E, 0x0B, 0x8E,\n+\t\t    0x10, 0x4F, 0x5B, 0x8F, 0xB8, 0x2D, 0xAC, 0x4C,\n+\t\t    0x94, 0x4B, 0x7C, 0x1E, 0xF1, 0x53, 0x20, 0x9B,\n+\t\t    0xD6, 0xC4, 0x92, 0x4C, 0x7F, 0xFB, 0x8B, 0x8E,\n+\t\t    0x40, 0x2F, 0x24, 0xA3, 0x4E, 0x46, 0x64, 0xF4,\n+\t\t    0xC6, 0x35, 0x0F, 0xC7, 0x40, 0x55, 0x43, 0xAF,\n+\t\t    0x7E, 0x91, 0x76, 0x48, 0x6F, 0x97, 0x7A, 0xF8,\n+\t\t    0x32, 0x1E, 0xD3, 0x5B, 0xBC, 0x19, 0xB5, 0x48,\n+\t\t    0xFA, 0x4F, 0x52, 0x77, 0x5B, 0x9E, 0xA2, 0xC8,\n+\t\t    0x9A, 0x83, 0x30, 0x8D, 0x9F, 0x0B, 0x6F, 0xA8,\n+\t\t    0x2E, 0x84, 0xCC, 0xC1, 0x50, 0x96, 0x46, 0xAE,\n+\t\t    0x73, 0x91, 0x7D, 0xCD, 0x88, 0xAB, 0x67, 0x3F,\n+\t\t    0x66, 0x3A, 0x8D, 0xB1, 0x89, 0x07, 0x93, 0xDB,\n+\t\t    0x42, 0x22, 0xDC, 0x13, 0xBD, 0xCD, 0xBB, 0x12,\n+\t\t    0x8D, 0x88, 0x44, 0x13, 0x22, 0x52, 0x81, 0xDC,\n+\t\t    0xEF, 0xA1, 0xE4, 0xA3, 0xA7, 0xBA, 0xEE, 0x98,\n+\t\t    0x79, 0x45, 0x29, 0x05, 0x65, 0x3D, 0xDC, 0xAF,\n+\t\t    0xA1, 0x37, 0x29, 0xFD, 0x05, 0xD1, 0x3A, 0xF7,\n+\t\t    0x32, 0x1D, 0x02, 0xEC, 0x28, 0x1E, 0x0F, 0x96,\n+\t\t    0xF3, 0x21, 0x19, 0x5F, 0x49, 0xB9, 0xEA, 0x9A,\n+\t\t    0xAD, 0x34, 0x58, 0xD1, 0xD9, 0xB1, 0x7D, 0xD2,\n+\t\t    0xEA, 0xED, 0x74, 0xE8, 0x25, 0x9A, 0x7B, 0xC5,\n+\t\t    0xC8, 0xD8, 0x76, 0xB6, 0xBC, 0x0B, 0x78, 0xCE,\n+\t\t    0xD9, 0xA6, 0xBB, 0x2F, 0x79, 0xA4, 0x45, 0x05,\n+\t\t    0x55, 0x6E, 0x20, 0x84, 0xEB, 0xC8, 0x70, 0xB0,\n+\t\t    0x3A, 0x2D, 0x06, 0x98, 0x29, 0x10, 0xB8, 0xC5,\n+\t\t    0xE9, 0xE4, 0xB6, 0xDE, 0x97, 0x9A, 0x0D, 0x8C,\n+\t\t    0xB6, 0x22, 0x16, 0x59, 0xAB, 0xB5, 0xD7, 0x14,\n+\t\t    0xAB, 0x08, 0x02, 0x27, 0x7B, 0xF7, 0x0E, 0xAC,\n+\t\t    0xC5, 0xAC, 0x4D, 0x7F, 0xE5, 0x65, 0x51, 0x40,\n+\t\t    0x44, 0x92, 0xB1, 0x6A, 0xB7, 0x00, 0x76, 0x89,\n+\t\t    0x6E, 0x08, 0x5F, 0x45, 0x2B, 0x53, 0x86, 0x86,\n+\t\t    0xA7, 0x85, 0xBC, 0x62, 0xAC, 0xAA, 0x82, 0x73,\n+\t\t    0x0A, 0xEB, 0x35, 0x16, 0x95, 0x26, 0xAB, 0x9E,\n+\t\t    0xE9, 0x64, 0x53, 0x99, 0x08, 0x31, 0xF5, 0x6B,\n+\t\t    0x1F, 0xFE, 0x47, 0x4B, 0x09, 0x33, 0x4F, 0xBF,\n+\t\t    0x1F, 0x0B, 0x4C, 0xB2, 0xB4, 0xA4, 0x17, 0xA9,\n+\t\t    0xAD, 0xC5, 0x62, 0x7C, 0xF1, 0x1B, 0xAE, 0x46,\n+\t\t    0xD3, 0xAC, 0xFD, 0x43, 0xFE, 0x79, 0xD0, 0x58,\n+\t\t    0x2F, 0x6C, 0x9F, 0xD0, 0x65, 0xA4, 0x64, 0x03,\n+\t\t    0xAF, 0x73, 0x46, 0x75, 0x7D, 0x49, 0x1B, 0x4C,\n+\t\t    0xFA, 0x49, 0xD8, 0x9A, 0xCC, 0x59, 0xC6, 0xC7,\n+\t\t    0xA1, 0x05, 0xC2, 0x32, 0xC8, 0x6C, 0x50, 0xA8,\n+\t\t    0x06, 0x58, 0xBE, 0x6C, 0x7D, 0x22, 0xD6, 0x0D,\n+\t\t    0x74, 0x40, 0xCE, 0xD6, 0x64, 0xD6, 0x47, 0xD0,\n+\t\t    0xBF, 0xF1, 0x5C, 0x54, 0xF9, 0x06, 0x3F, 0x3D,\n+\t\t    0x86, 0xBA, 0xF2, 0x0F, 0x5E, 0x2C, 0x01, 0xCC,\n+\t\t    0xD9, 0xC7, 0xB1, 0x4A, 0xB3, 0xD7, 0x26, 0xCC,\n+\t\t    0xC3, 0x7A, 0x74, 0x2C, 0xE1, 0x22, 0x65, 0xA0,\n+\t\t    0x5B, 0xCA, 0xF4, 0xE1, 0x7D, 0xE1, 0x56, 0xFD,\n+\t\t    0x94, 0x10, 0xC6, 0xA1, 0x4A, 0xE8, 0x6B, 0x34,\n+\t\t    0x4E, 0x71, 0x60, 0x77, 0x0F, 0x03, 0xDD, 0xFF,\n+\t\t    0xC8, 0x59, 0x54, 0x6C, 0xD4, 0x4A, 0x55, 0x24,\n+\t\t    0x35, 0x21, 0x60, 0x73, 0xDF, 0x6F, 0xE7, 0x3C,\n+\t\t    0xC2, 0xF0, 0xDA, 0xA9, 0xE5, 0x8C, 0xAC, 0xB6,\n+\t\t    0xFD, 0x2E, 0xF7, 0xA0, 0x18, 0xA7, 0x55, 0x47,\n+\t\t    0xD1, 0xCB, 0x9E, 0xAA, 0x58, 0x54, 0x3B, 0x37,\n+\t\t    0x18, 0xB5, 0xC1, 0xBB, 0x41, 0x59, 0xE4, 0x28,\n+\t\t    0x4A, 0x13, 0x90, 0x6A, 0xF7, 0xD1, 0xB3, 0x71,\n+\t\t    0xB6, 0x6E, 0xF6, 0x5D, 0x2E, 0x0E, 0x6C, 0x4A,\n+\t\t    0x7B, 0xF7, 0xB6, 0x21, 0xD4, 0xFC, 0x47, 0x8C,\n+\t\t    0x9B, 0x0A, 0x90, 0xAC, 0x11, 0x52, 0x86, 0x07,\n+\t\t    0x24, 0xDA, 0xA9, 0x49, 0x50, 0xD9, 0xDC, 0xE2,\n+\t\t    0x19, 0x87, 0x73, 0x88, 0xC3, 0xE4, 0xED, 0xC9,\n+\t\t    0x1C, 0xA8, 0x7E, 0x39, 0x48, 0x91, 0x10, 0xAB,\n+\t\t    0xFC, 0x3C, 0x1E, 0xEE, 0x08, 0xA1, 0xB9, 0xB2,\n+\t\t    0x02, 0x57, 0xB1, 0xD1, 0x35, 0x5E, 0x3D, 0x94,\n+\t\t    0xFB, 0x36, 0x27, 0x1A, 0x0E, 0x75, 0xFC, 0xBC,\n+\t\t    0xDB, 0xF3, 0xF5, 0x7C, 0x08, 0x39, 0xAA, 0xF4,\n+\t\t    0x2E, 0xEE, 0xCF, 0xCD, 0x2D, 0x70, 0xB8, 0x84,\n+\t\t    0xE6, 0x22, 0x5C, 0xC0, 0xB9, 0x33, 0xCB, 0x97,\n+\t\t    0xA1, 0xA3, 0xEE, 0x93, 0x71, 0xCF, 0xC9, 0x21,\n+\t\t    0x31, 0x7A, 0xEC, 0xE7, 0x70, 0xF2, 0xAA, 0x91,\n+\t\t    0xAA, 0x48, 0xAD, 0xAC, 0x03, 0xB1, 0x26, 0x52,\n+\t\t    0xBC, 0x65, 0x22, 0xA1, 0x09, 0x3D, 0xAB, 0x16,\n+\t\t    0x08, 0xBF, 0xCF, 0x3F, 0x59, 0x08, 0x6F, 0x68,\n+\t\t    0xEB, 0x8A, 0xB3, 0xCF, 0x77, 0x82, 0xFB, 0x25,\n+\t\t    0x78, 0x16, 0x4C, 0xDB, 0x72, 0xF5, 0xCF, 0x79,\n+\t\t    0x71, 0xE4, 0x4E, 0x23, 0x15, 0x7F, 0x1E, 0xA8,\n+\t\t    0x3E, 0xC0, 0x59, 0x91, 0x20, 0xAE, 0x2C, 0x1D,\n+\t\t    0x90, 0xC8, 0x49, 0x42, 0x48, 0x29, 0x82, 0x66,\n+\t\t    0x68, 0x49, 0x73, 0xDA, 0xE4, 0x28, 0xCD, 0x7B,\n+\t\t    0x4D, 0xE4, 0x23, 0x34, 0xB9, 0xE1, 0xB4, 0x42,\n+\t\t    0x67, 0x22, 0x5B, 0xEE, 0xE6, 0x74, 0x32, 0x6F,\n+\t\t    0x21, 0x9F, 0x97, 0x46, 0x03, 0xE1, 0xC9, 0x7A,\n+\t\t    0x14, 0x27, 0x30, 0xE1, 0xB2, 0x34, 0xE6, 0xAF,\n+\t\t    0x7B, 0xAA, 0xDD, 0x89, 0x04, 0x30, 0xD6, 0x78,\n+\t\t    0x0B, 0x3D, 0xC3, 0x69, 0xB0, 0x67, 0x4F, 0x4E,\n+\t\t    0x12, 0x21, 0x93, 0x2D, 0x79, 0xDD, 0x8B, 0xDB,\n+\t\t    0xEA, 0x90, 0x66, 0x54, 0xA8, 0x05, 0xF2, 0xE4,\n+\t\t    0x59, 0x8A, 0x96, 0x52, 0x30, 0xF0, 0x4E, 0x9A,\n+\t\t    0xE5, 0xD8, 0x72, 0x1C, 0x3B, 0x63, 0x02, 0xB9,\n+\t\t    0xC7, 0xA1, 0xDA, 0xC8, 0x6C, 0x48, 0xE0, 0xDE,\n+\t\t    0x59, 0x64, 0x89, 0x2C, 0xF9, 0xC8, 0x3B, 0x00,\n+\t\t    0xEC, 0xF2, 0x68, 0x51, 0x67, 0x05, 0x85, 0xAF,\n+\t\t    0xB8, 0xD5, 0x65, 0xEE, 0x73, 0x26, 0x88, 0xFB,\n+\t\t    0xA9, 0xD6, 0x6C, 0x68, 0x9D, 0x9F, 0x23, 0x6A,\n+\t\t    0x10, 0x24, 0x82, 0xB2, 0xB7, 0x40, 0x19, 0x3E,\n+\t\t    0x6F, 0xA2, 0xD5, 0x2C, 0x6E, 0x8D, 0xE9, 0x33,\n+\t\t    0x6E, 0x24, 0x94, 0x05, 0xE9, 0x2D, 0xD9, 0x3A,\n+\t\t    0x8C, 0xE5, 0xCC, 0x1D, 0x3F, 0xB8, 0x71, 0xA8,\n+\t\t    0x98, 0x33, 0xBB, 0x1A, 0xAC, 0x41, 0x0A, 0x04,\n+\t\t    0xFE, 0x4D, 0x46, 0x17, 0x8A, 0xCB, 0xF3, 0x4B,\n+\t\t    0x97, 0x02, 0xCC, 0x9D, 0x11, 0xF1, 0xBC, 0xA9,\n+\t\t    0xC1, 0xD1, 0xB6, 0xD6, 0x7B, 0x5F, 0x9D, 0x22,\n+\t\t    0x86, 0x71, 0xEC, 0x42, 0x53, 0xB7, 0x85, 0x30,\n+\t\t    0xAF, 0x1D, 0x01, 0xA7, 0xBF, 0x72, 0xC2, 0xC6,\n+\t\t    0xC9, 0xB8, 0xD8, 0xC7, 0xE9, 0xC4, 0xBA, 0xC5,\n+\t\t    0xB1, 0x8A, 0xB8, 0x62, 0xBF, 0x75, 0x75, 0x69,\n+\t\t    0xF8, 0x8D, 0x7E, 0xD9, 0xD2, 0x28, 0xB5, 0x40,\n+\t\t    0xCE, 0xCB, 0xB8, 0x74, 0x31, 0x40, 0x7B, 0x0D,\n+\t\t    0x73, 0x98, 0x99, 0x12, 0xB7, 0x75, 0x3E, 0xBC,\n+\t\t    0xAE, 0x48, 0xCA, 0xA9, 0x1E, 0xA7, 0x95, 0x31,\n+\t\t    0x87, 0x0F, 0x14, 0x52, 0xB6, 0x8E, 0x42, 0x50,\n+\t\t    0xB2, 0x76, 0x75, 0xD8, 0x7E, 0x66, 0x23, 0x13,\n+\t\t    0x8B, 0x29, 0xAA, 0x13, 0xCA, 0x8A, 0xD8, 0x9B,\n+\t\t    0x7B, 0x38, 0xD2, 0xE8, 0x67, 0xD1, 0x89, 0x25,\n+\t\t    0x9C, 0x63, 0x2F, 0xC3, 0x26, 0xC7, 0x74, 0x83,\n+\t\t    0x05, 0xED, 0x67, 0x02, 0x85, 0xAD, 0x1D, 0x0E,\n+\t\t    0xA9, 0xD6, 0xE1, 0xC7, 0x39, 0xA0, 0x6E, 0x72,\n+\t\t    0xCE, 0x56, 0x6C, 0xB8, 0x4A, 0xDE, 0x11, 0xA2,\n+\t\t    0xBF, 0xC1, 0x84, 0x98, 0x8F, 0xCA, 0x79, 0x74,\n+\t\t    0xCA, 0x9F, 0x45, 0x16, 0xBC, 0xB1, 0xF4, 0x03,\n+\t\t    0x76, 0x6E, 0xD5, 0x46, 0x60, 0xD7, 0x1D, 0xF0,\n+\t\t    0x87, 0x29, 0x63, 0x07, 0x06, 0xB9, 0xC2, 0x69,\n+\t\t    0x6D, 0xF9, 0x4B, 0x30, 0x96, 0x83, 0xB8, 0xC5,\n+\t\t    0xBE, 0x3A, 0xBA, 0xD0, 0x3E, 0x2B, 0x04, 0x16,\n+\t\t    0x6A, 0x00, 0x3B, 0x1A, 0x8E, 0xF8, 0xF6, 0x21,\n+\t\t    0x01, 0xD6, 0x08, 0x41, 0x74, 0xA2, 0xFC, 0x36,\n+\t\t    0xED, 0x11, 0x51, 0x5A, 0x4A, 0x21, 0x1A, 0x03,\n+\t\t    0x11, 0x95, 0x11, 0xF6, 0x73, 0x38, 0x67, 0xFC,\n+\t\t    0xF1, 0x2B, 0x22, 0x54, 0x65, 0x40, 0x7D, 0x8C,\n+\t\t    0x13, 0xC4, 0x46, 0x87, 0x09, 0x2B, 0xB5, 0xA1,\n+\t\t    0x82, 0x49, 0x46, 0x56, 0xF5, 0x5F, 0xF1, 0x04,\n+\t\t    0xD8, 0x6F, 0xDB, 0x38, 0xAD, 0xF4, 0x1A, 0xA3,\n+\t\t    0xFF, 0x7C, 0xC7, 0xA6, 0xAF, 0x87, 0x5C, 0x8C,\n+\t\t    0xEA, 0x3C, 0x9D, 0x7A, 0x4A, 0xD8, 0xA8, 0x66,\n+\t\t    0xDB, 0xBF, 0x12, 0x58, 0x98, 0x8E, 0xBA, 0x6F,\n+\t\t    0xAF, 0x20, 0xDA, 0xEE, 0x82, 0x34, 0x2F, 0x33,\n+\t\t    0x88, 0x98, 0xBA, 0xB2, 0x54, 0x7F, 0x9E, 0x63,\n+\t\t    0x19, 0x6C, 0x7D, 0xCE, 0x85, 0xF8, 0xB6, 0x77,\n+\t\t    0xCB, 0x38, 0x1F, 0xB1, 0x79, 0xBD, 0xED, 0x32,\n+\t\t    0xE3, 0xB9, 0x40, 0xEF, 0x3E, 0x6C, 0x29, 0x88,\n+\t\t    0x70, 0x99, 0x47, 0xA6, 0x4A, 0x1C, 0xCC, 0x0B,\n+\t\t    0x9B, 0x72, 0xA9, 0x29, 0x83, 0x4C, 0xDE, 0x4F,\n+\t\t    0x65, 0x4E, 0xCE, 0xBD, 0xFA, 0x76, 0x8D, 0xA6,\n+\t\t    0x1A, 0xD8, 0x66, 0xFE, 0xA4, 0x2A, 0x61, 0x50,\n+\t\t    0xEE, 0x15, 0xF1, 0xF0, 0x9D, 0xFF, 0xEC, 0xEE,\n+\t\t    0x00, 0x03, 0xFE, 0xAC, 0x53, 0x02, 0xCC, 0x87,\n+\t\t    0xB1, 0xA2, 0xD8, 0x34, 0x2C, 0xEC, 0xA6, 0x4C,\n+\t\t    0x02, 0xC0, 0xC1, 0x72, 0xD6, 0x54, 0x35, 0x24,\n+\t\t    0x25, 0x8B, 0xEC, 0xDA, 0x47, 0x5F, 0x5D, 0x7E,\n+\t\t    0xD8, 0x01, 0x51, 0xDD, 0x8F, 0xB4, 0x48, 0xDD,\n+\t\t    0x94, 0x99, 0x95, 0x77, 0xB3, 0x42, 0x14, 0xEB,\n+\t\t    0x26, 0x61, 0xE9, 0x22, 0xE3, 0x07, 0x73, 0xFB,\n+\t\t    0xEF, 0x38, 0x55, 0x35, 0x8F, 0xCC, 0x30, 0x1E,\n+\t\t    0x38, 0xE0, 0x35, 0xF4, 0x9A, 0x7C, 0xCF, 0x38,\n+\t\t    0x0B, 0x9E, 0xF4, 0x88, 0x4A, 0xEA, 0xF2, 0x67,\n+\t\t    0x9F, 0x61, 0x40, 0x34, 0x09, 0xDC, 0xBF, 0xFB,\n+\t\t    0x22, 0x27, 0x04, 0x8B, 0x8D, 0x85, 0x7F, 0xB2,\n+\t\t    0x29, 0x62, 0x25, 0x73, 0x7F, 0x46, 0x2E, 0xA3,\n+\t\t    0x8E, 0xAF, 0xEC, 0x55, 0x98, 0x1A, 0xEE, 0x29,\n+\t\t    0xA0, 0x1A, 0x5F, 0xFE, 0x5D, 0xA5, 0x76, 0x93,\n+\t\t    0xAB, 0x57, 0x56, 0xEA, 0xDB, 0x39, 0xAC, 0x48,\n+\t\t    0xBE, 0x95, 0x92, 0x2B, 0xC6, 0xE1, 0x2F, 0x36,\n+\t\t    0x4B, 0x08, 0x01, 0x90, 0x50, 0xD8, 0xFA, 0xF9,\n+\t\t    0x94, 0x4E, 0x76, 0x9B, 0x72, 0x59, 0xC2, 0x2F,\n+\t\t    0x61, 0x04, 0x0A, 0x9E, 0x28, 0xE5, 0x24, 0x1E,\n+\t\t    0x79, 0xCF, 0x8D, 0xB6, 0x52, 0xA7, 0x79, 0x5F,\n+\t\t    0x44, 0x98, 0xD5, 0x0E, 0x6E, 0x4B, 0x64, 0x9B,\n+\t\t},\n+\t\t.len = 2048\n+\t},\n+\t.auth_tags[0] = {\n+\t\t.size = 64,\n+\t\t.data = { 0x4d, 0x5c, 0x2a, 0xf3, 0x27, 0xcd, 0x64, 0xa6,\n+\t\t\t0x2c, 0xf3, 0x5a, 0xbd, 0x2b, 0xa6, 0xfa, 0xb4 },\n+\t\t.len = 16\n+\t},\n+\t.auth_tags[1] = {\n+\t\t.size = 128,\n+\t\t.data = { 0xE9, 0xA9, 0x75, 0xB6, 0xEF, 0x6F, 0x8C, 0xF1,\n+\t\t    0xB3, 0xA9, 0x19, 0xA4, 0xAE, 0x66, 0xBD, 0x9E },\n+\t\t.len = 16\n+\t},\n+\t.auth_tags[2] = {\n+\t\t.size = 256,\n+\t\t.data = { 0x29, 0xC3, 0x18, 0x96, 0x54, 0xCB, 0xF5, 0xAA,\n+\t\t    0x4E, 0x62, 0xB6, 0xFF, 0x45, 0xA6, 0x18, 0x0C },\n+\t\t.len = 16\n+\t},\n+\t.auth_tags[3] = {\n+\t\t.size = 512,\n+\t\t.data = { 0x3B, 0xD7, 0xC3, 0x5F, 0xE4, 0x1B, 0xC2, 0xBC,\n+\t\t    0xE9, 0xAC, 0xF2, 0xCE, 0xA7, 0x7B, 0x1D, 0x70 },\n+\t\t.len = 16\n+\t},\n+\t.auth_tags[4] = {\n+\t\t.size = 1024,\n+\t\t.data = { 0xCC, 0xBB, 0xBC, 0xCF, 0x86, 0x01, 0x4D, 0x93,\n+\t\t    0x4B, 0x68, 0x55, 0x19, 0xA1, 0x40, 0xCD, 0xEA },\n+\t\t.len = 16\n+\t},\n+\t.auth_tags[5] = {\n+\t\t.size = 1536,\n+\t\t.data = { 0x67, 0x31, 0x11, 0xA2, 0x58, 0xB5, 0x1C, 0x23,\n+\t\t    0xC0, 0x41, 0x05, 0x30, 0xC6, 0xBA, 0xFA, 0x88 },\n+\t\t.len = 16\n+\t},\n+\t.auth_tags[6] = {\n+\t\t.size = 2048,\n+\t\t.data = { 0x03, 0x9C, 0x6B, 0xB9, 0x57, 0xBF, 0x6E, 0x86,\n+\t\t\t0x3A, 0x09, 0x5F, 0x08, 0xA9, 0xE4, 0xF2, 0x1F },\n+\t\t.len = 16\n+\t},\n+\t.auth_tag = {\n+\t\t.data = {\n+\t\t    0x03, 0x9C, 0x6B, 0xB9, 0x57, 0xBF, 0x6E, 0x86,\n+\t\t    0x3A, 0x09, 0x5F, 0x08, 0xA9, 0xE4, 0xF2, 0x1F\n+\t\t},\n+\t\t.len = 16\n+\t},\n+};\n+\n #endif /* TEST_CRYPTODEV_GCM_TEST_VECTORS_H_ */\ndiff --git a/app/test/test_cryptodev_perf.c b/app/test/test_cryptodev_perf.c\nindex 20713d4..3fe9b14 100644\n--- a/app/test/test_cryptodev_perf.c\n+++ b/app/test/test_cryptodev_perf.c\n@@ -41,6 +41,7 @@\n \n #include \"test.h\"\n #include \"test_cryptodev.h\"\n+#include \"test_cryptodev_gcm_test_vectors.h\"\n \n \n #define PERF_NUM_OPS_INFLIGHT\t\t(128)\n@@ -64,6 +65,55 @@ enum chain_mode {\n \tHASH_ONLY\n };\n \n+\n+struct symmetric_op {\n+\tconst uint8_t *iv_data;\n+\tuint32_t iv_len;\n+\n+\tconst uint8_t *aad_data;\n+\tuint32_t aad_len;\n+\n+\tconst uint8_t *p_data;\n+\tuint32_t p_len;\n+\n+\tconst uint8_t *c_data;\n+\tuint32_t c_len;\n+\n+\tconst uint8_t *t_data;\n+\tuint32_t t_len;\n+\n+};\n+\n+struct symmetric_session_attrs {\n+\tenum rte_crypto_cipher_operation cipher;\n+\tenum rte_crypto_auth_operation auth;\n+\n+\tenum rte_crypto_cipher_algorithm cipher_algorithm;\n+\tconst uint8_t *key_cipher_data;\n+\tuint32_t key_cipher_len;\n+\n+\tenum rte_crypto_auth_algorithm auth_algorithm;\n+\tconst uint8_t *key_auth_data;\n+\tuint32_t key_auth_len;\n+\n+\tuint32_t digest_len;\n+};\n+\n+#define ALIGN_POW2_ROUNDUP(num, align) \\\n+\t(((num) + (align) - 1) & ~((align) - 1))\n+\n+/*\n+ * This struct is needed to avoid unnecessary allocation or checking\n+ * of allocation of crypto params with current alloc on the fly\n+ * implementation.\n+ */\n+\n+struct crypto_params {\n+\tuint8_t *aad;\n+\tuint8_t *iv;\n+\tuint8_t *digest;\n+};\n+\n struct perf_test_params {\n \n \tunsigned total_operations;\n@@ -75,6 +125,10 @@ struct perf_test_params {\n \tenum rte_crypto_cipher_algorithm cipher_algo;\n \tunsigned cipher_key_length;\n \tenum rte_crypto_auth_algorithm auth_algo;\n+\n+\tstruct symmetric_session_attrs *session_attrs;\n+\n+\tstruct symmetric_op *symmetric_op;\n };\n \n #define MAX_NUM_OF_OPS_PER_UT\t(128)\n@@ -258,6 +312,21 @@ testsuite_setup(void)\n \t\t}\n \t}\n \n+\t/* Create 2 AESNI GCM devices if required */\n+\tif (gbl_cryptodev_perftest_devtype == RTE_CRYPTODEV_AESNI_GCM_PMD) {\n+\t\tnb_devs = rte_cryptodev_count_devtype(RTE_CRYPTODEV_AESNI_GCM_PMD);\n+\t\tif (nb_devs < 2) {\n+\t\t\tfor (i = nb_devs; i < 2; i++) {\n+\t\t\t\tret = rte_eal_vdev_init(\n+\t\t\t\t\tRTE_STR(CRYPTODEV_NAME_AESNI_GCM_PMD), NULL);\n+\n+\t\t\t\tTEST_ASSERT(ret == 0,\n+\t\t\t\t\t\"Failed to create instance %u of pmd : %s\",\n+\t\t\t\t\ti, RTE_STR(CRYPTODEV_NAME_AESNI_GCM_PMD));\n+\t\t\t}\n+\t\t}\n+\t}\n+\n \t/* Create 2 SNOW3G devices if required */\n \tif (gbl_cryptodev_perftest_devtype == RTE_CRYPTODEV_SNOW3G_PMD) {\n \t\tnb_devs = rte_cryptodev_count_devtype(RTE_CRYPTODEV_SNOW3G_PMD);\n@@ -339,7 +408,8 @@ testsuite_setup(void)\n static void\n testsuite_teardown(void)\n {\n-\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct crypto_testsuite_params *ts_params =\n+\t\t\t&testsuite_params;\n \n \tif (ts_params->mbuf_mp != NULL)\n \t\tRTE_LOG(DEBUG, USER1, \"CRYPTO_PERF_MBUFPOOL count %u\\n\",\n@@ -2849,7 +2919,391 @@ test_perf_aes_cbc_vary_burst_size(void)\n \treturn test_perf_crypto_qp_vary_burst_size(testsuite_params.dev_id);\n }\n \n-#if 1\n+\n+static struct rte_cryptodev_sym_session *\n+test_perf_create_session(uint8_t dev_id, struct perf_test_params *pparams)\n+{\n+\tstatic struct rte_cryptodev_sym_session *sess;\n+\tstruct rte_crypto_sym_xform cipher_xform = { 0 };\n+\tstruct rte_crypto_sym_xform auth_xform = { 0 };\n+\n+\tuint8_t cipher_key[pparams->session_attrs->key_cipher_len];\n+\tuint8_t auth_key[pparams->session_attrs->key_auth_len];\n+\n+\tmemcpy(cipher_key, pparams->session_attrs->key_cipher_data,\n+\t\t pparams->session_attrs->key_cipher_len);\n+\tmemcpy(auth_key, pparams->session_attrs->key_auth_data,\n+\t\t pparams->session_attrs->key_auth_len);\n+\n+\tcipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\tcipher_xform.next = NULL;\n+\n+\tcipher_xform.cipher.algo = pparams->session_attrs->cipher_algorithm;\n+\tcipher_xform.cipher.op = pparams->session_attrs->cipher;\n+\tcipher_xform.cipher.key.data = cipher_key;\n+\tcipher_xform.cipher.key.length = pparams->session_attrs->key_cipher_len;\n+\n+\tauth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;\n+\tauth_xform.next = NULL;\n+\n+\tauth_xform.auth.op = pparams->session_attrs->auth;\n+\tauth_xform.auth.algo = pparams->session_attrs->auth_algorithm;\n+\n+\tauth_xform.auth.digest_length = pparams->session_attrs->digest_len;\n+\tauth_xform.auth.key.length = pparams->session_attrs->key_auth_len;\n+\n+\n+\tcipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;\n+\tif (cipher_xform.cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\tcipher_xform.next = &auth_xform;\n+\t\tsess = rte_cryptodev_sym_session_create(dev_id,\n+\t\t\t\t&cipher_xform);\n+\t} else {\n+\t\tauth_xform.next = &cipher_xform;\n+\t\tsess = rte_cryptodev_sym_session_create(dev_id,\n+\t\t\t\t&auth_xform);\n+\t}\n+\n+\treturn sess;\n+}\n+\n+static inline struct rte_crypto_op *\n+perf_gcm_set_crypto_op(struct rte_crypto_op *op, struct rte_mbuf *m,\n+\t\tstruct rte_cryptodev_sym_session *sess,\n+\t\tstruct crypto_params *m_hlp,\n+\t\tstruct perf_test_params *params)\n+{\n+\tif (rte_crypto_op_attach_sym_session(op, sess) != 0) {\n+\t\trte_crypto_op_free(op);\n+\t\treturn NULL;\n+\t}\n+\n+\tuint16_t iv_pad_len = ALIGN_POW2_ROUNDUP(params->symmetric_op->iv_len,\n+\t\t\t\t\t\t 16);\n+\n+\top->sym->auth.digest.data = m_hlp->digest;\n+\top->sym->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(\n+\t\t\t\t\t  m,\n+\t\t\t\t\t  params->symmetric_op->aad_len +\n+\t\t\t\t\t  iv_pad_len +\n+\t\t\t\t\t  params->symmetric_op->p_len);\n+\n+\top->sym->auth.digest.length = params->symmetric_op->t_len;\n+\n+\top->sym->auth.aad.data = m_hlp->aad;\n+\top->sym->auth.aad.length = params->symmetric_op->aad_len;\n+\top->sym->auth.aad.phys_addr = rte_pktmbuf_mtophys_offset(\n+\t\t\t\t\t  m,\n+\t\t\t\t\t  iv_pad_len);\n+\n+\trte_memcpy(op->sym->auth.aad.data, params->symmetric_op->aad_data,\n+\t\t       params->symmetric_op->aad_len);\n+\n+\top->sym->cipher.iv.data = m_hlp->iv;\n+\trte_memcpy(op->sym->cipher.iv.data, params->symmetric_op->iv_data,\n+\t\t       params->symmetric_op->iv_len);\n+\tif (params->symmetric_op->iv_len == 12)\n+\t\top->sym->cipher.iv.data[15] = 1;\n+\n+\top->sym->cipher.iv.length = params->symmetric_op->iv_len;\n+\n+\top->sym->auth.data.offset =\n+\t\t\tiv_pad_len + params->symmetric_op->aad_len;\n+\top->sym->auth.data.length = params->symmetric_op->p_len;\n+\n+\top->sym->cipher.data.offset =\n+\t\t\tiv_pad_len + params->symmetric_op->aad_len;\n+\top->sym->cipher.data.length = params->symmetric_op->p_len;\n+\n+\top->sym->m_src = m;\n+\n+\treturn op;\n+}\n+\n+static struct rte_mbuf *\n+test_perf_create_pktmbuf_fill(struct rte_mempool *mpool,\n+\t\tstruct perf_test_params *params,\n+\t\tunsigned buf_sz, struct crypto_params *m_hlp)\n+{\n+\tstruct rte_mbuf *m = rte_pktmbuf_alloc(mpool);\n+\tuint16_t iv_pad_len =\n+\t\t\tALIGN_POW2_ROUNDUP(params->symmetric_op->iv_len, 16);\n+\tuint16_t aad_len = params->symmetric_op->aad_len;\n+\tuint16_t digest_size = params->symmetric_op->t_len;\n+\tchar *p;\n+\n+\tp = rte_pktmbuf_append(m, aad_len);\n+\tif (p == NULL) {\n+\t\trte_pktmbuf_free(m);\n+\t\treturn NULL;\n+\t}\n+\tm_hlp->aad = (uint8_t *)p;\n+\n+\tp = rte_pktmbuf_append(m, iv_pad_len);\n+\tif (p == NULL) {\n+\t\trte_pktmbuf_free(m);\n+\t\treturn NULL;\n+\t}\n+\tm_hlp->iv = (uint8_t *)p;\n+\n+\tp = rte_pktmbuf_append(m, buf_sz);\n+\tif (p == NULL) {\n+\t\trte_pktmbuf_free(m);\n+\t\treturn NULL;\n+\t}\n+\trte_memcpy(p, params->symmetric_op->p_data, buf_sz);\n+\n+\tp = rte_pktmbuf_append(m, digest_size);\n+\tif (p == NULL) {\n+\t\trte_pktmbuf_free(m);\n+\t\treturn NULL;\n+\t}\n+\tm_hlp->digest = (uint8_t *)p;\n+\n+\treturn m;\n+}\n+\n+static int\n+perf_AES_GCM(uint8_t dev_id, uint16_t queue_id,\n+\t     struct perf_test_params *pparams, uint32_t test_ops)\n+{\n+\tint j = 0;\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct rte_cryptodev_sym_session *sess;\n+\tstruct rte_crypto_op *ops[pparams->burst_size];\n+\tstruct rte_crypto_op *proc_ops[pparams->burst_size];\n+\tuint32_t total_operations = pparams->total_operations;\n+\n+\tuint64_t burst_enqueued = 0, total_enqueued = 0, burst_dequeued = 0;\n+\tuint64_t processed = 0, failed_polls = 0, retries = 0;\n+\tuint64_t tsc_start = 0, tsc_end = 0;\n+\n+\tuint16_t i = 0, l = 0, m = 0;\n+\tuint16_t burst = pparams->burst_size * NUM_MBUF_SETS;\n+\tuint16_t ops_unused = 0;\n+\n+\tstruct rte_mbuf *mbufs[burst];\n+\tstruct crypto_params m_hlp[burst];\n+\n+\tif (rte_cryptodev_count() == 0) {\n+\t\tprintf(\"\\nNo crypto devices available. \"\n+\t\t\t\t\"Is kernel driver loaded?\\n\");\n+\t\treturn TEST_FAILED;\n+\t}\n+\n+\tsess = test_perf_create_session(dev_id, pparams);\n+\tTEST_ASSERT_NOT_NULL(sess, \"Session creation failed\");\n+\n+\tfor (i = 0; i < burst; i++) {\n+\t\tmbufs[i] = test_perf_create_pktmbuf_fill(\n+\t\t\t\tts_params->mbuf_mp,\n+\t\t\t\tpparams, pparams->symmetric_op->p_len,\n+\t\t\t\t&m_hlp[i]);\n+\t}\n+\n+\tif (test_ops)\n+\t\ttotal_operations = test_ops;\n+\n+\ttsc_start = rte_rdtsc_precise();\n+\twhile (total_enqueued < total_operations) {\n+\t\tuint16_t burst_size =\n+\t\ttotal_enqueued+pparams->burst_size <= total_operations ?\n+\t\tpparams->burst_size : total_operations-total_enqueued;\n+\t\tuint16_t ops_needed = burst_size-ops_unused;\n+\n+\t\tif (ops_needed != rte_crypto_op_bulk_alloc(ts_params->op_mpool,\n+\t\t\t\tRTE_CRYPTO_OP_TYPE_SYMMETRIC, ops, ops_needed)){\n+\t\t\tprintf(\"\\nFailed to alloc enough ops, \"\n+\t\t\t\t\t\"finish dequeuing\");\n+\t\t} else {\n+\t\t\tfor (i = 0; i < ops_needed; i++)\n+\t\t\t\tops[i] = perf_gcm_set_crypto_op(ops[i],\n+\t\t\t\t\tmbufs[i + (pparams->burst_size *\n+\t\t\t\t\t\t(j % NUM_MBUF_SETS))],\n+\t\t\t\t\tsess, &m_hlp[i + (pparams->burst_size *\n+\t\t\t\t\t\t(j % NUM_MBUF_SETS))], pparams);\n+\n+\t\t\t/* enqueue burst */\n+\t\t\tburst_enqueued = rte_cryptodev_enqueue_burst(dev_id,\n+\t\t\t\t\tqueue_id, ops, burst_size);\n+\n+\t\t\tif (burst_enqueued < burst_size)\n+\t\t\t\tretries++;\n+\n+\t\t\tops_unused = burst_size-burst_enqueued;\n+\t\t\ttotal_enqueued += burst_enqueued;\n+\t\t}\n+\n+\t\t/* dequeue burst */\n+\t\tburst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,\n+\t\t\t\tproc_ops, pparams->burst_size);\n+\t\tif (burst_dequeued == 0)\n+\t\t\tfailed_polls++;\n+\t\telse {\n+\t\t\tprocessed += burst_dequeued;\n+\n+\t\t\tfor (l = 0; l < burst_dequeued; l++)\n+\t\t\t\trte_crypto_op_free(proc_ops[l]);\n+\t\t}\n+\n+\t\tj++;\n+\t}\n+\n+\t/* Dequeue any operations still in the crypto device */\n+\twhile (processed < total_operations) {\n+\t\t/* Sending 0 length burst to flush sw crypto device */\n+\t\trte_cryptodev_enqueue_burst(dev_id, queue_id, NULL, 0);\n+\n+\t\t/* dequeue burst */\n+\t\tburst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,\n+\t\t\t\tproc_ops, pparams->burst_size);\n+\t\tif (burst_dequeued == 0)\n+\t\t\tfailed_polls++;\n+\t\telse {\n+\t\t\tprocessed += burst_dequeued;\n+\n+\t\tfor (m = 0; m < burst_dequeued; m++) {\n+\t\t\tif (test_ops) {\n+\t\t\t\tuint16_t iv_pad_len = ALIGN_POW2_ROUNDUP\n+\t\t\t\t\t(pparams->symmetric_op->iv_len, 16);\n+\t\t\t\tuint8_t *pkt = rte_pktmbuf_mtod(\n+\t\t\t\t\tproc_ops[m]->sym->m_src,\n+\t\t\t\t\tuint8_t *);\n+\n+\t\t\t\tTEST_ASSERT_BUFFERS_ARE_EQUAL(\n+\t\t\t\t\tpparams->symmetric_op->c_data,\n+\t\t\t\t\tpkt + iv_pad_len +\n+\t\t\t\t\tpparams->symmetric_op->aad_len,\n+\t\t\t\t\tpparams->symmetric_op->c_len,\n+\t\t\t\t\t\"GCM Ciphertext data not as expected\");\n+\n+\t\t\t\tTEST_ASSERT_BUFFERS_ARE_EQUAL(\n+\t\t\t\t\tpparams->symmetric_op->t_data,\n+\t\t\t\t\tpkt + iv_pad_len +\n+\t\t\t\t\tpparams->symmetric_op->aad_len +\n+\t\t\t\t\tpparams->symmetric_op->c_len,\n+\t\t\t\t\tpparams->symmetric_op->t_len,\n+\t\t\t\t\t\"GCM MAC data not as expected\");\n+\n+\t\t\t\t}\n+\t\t\t\trte_crypto_op_free(proc_ops[m]);\n+\t\t\t}\n+\t\t}\n+\t}\n+\n+\ttsc_end = rte_rdtsc_precise();\n+\n+\tdouble ops_s = ((double)processed / (tsc_end - tsc_start))\n+\t\t\t* rte_get_tsc_hz();\n+\tdouble throughput = (ops_s * pparams->symmetric_op->p_len * 8)\n+\t\t\t/ 1000000000;\n+\n+\tif (!test_ops) {\n+\t\tprintf(\"\\n%u\\t\\t%6.2f\\t%16.2f\\t%8\"PRIu64\"\\t%10\"PRIu64,\n+\t\tpparams->symmetric_op->p_len,\n+\t\tops_s/1000000, throughput, retries, failed_polls);\n+\t}\n+\n+\tfor (i = 0; i < burst; i++)\n+\t\trte_pktmbuf_free(mbufs[i]);\n+\n+\treturn 0;\n+}\n+\n+static int\n+test_perf_AES_GCM(void)\n+{\n+\tuint16_t i, j;\n+\n+\tuint16_t buf_lengths[] = { 64, 128, 256, 512, 1024, 1536, 2048 };\n+\n+\tstatic const struct cryptodev_perf_test_data *gcm_tests[] = {\n+\t\t\t&AES_GCM_128_12IV_0AAD\n+\t};\n+\n+\tint TEST_CASES_GCM = RTE_DIM(gcm_tests);\n+\n+\tconst unsigned burst_size = 32;\n+\n+\tstruct symmetric_op ops_set[TEST_CASES_GCM];\n+\tstruct perf_test_params params_set[TEST_CASES_GCM];\n+\tstruct symmetric_session_attrs session_attrs[TEST_CASES_GCM];\n+\tstatic const struct cryptodev_perf_test_data *gcm_test;\n+\n+\tfor (i = 0; i < TEST_CASES_GCM; ++i) {\n+\n+\t\tgcm_test = gcm_tests[i];\n+\n+\t\tsession_attrs[i].cipher =\n+\t\t\t\tRTE_CRYPTO_CIPHER_OP_ENCRYPT;\n+\t\tsession_attrs[i].cipher_algorithm =\n+\t\t\t\tRTE_CRYPTO_CIPHER_AES_GCM;\n+\t\tsession_attrs[i].key_cipher_data =\n+\t\t\t\tgcm_test->key.data;\n+\t\tsession_attrs[i].key_cipher_len =\n+\t\t\t\tgcm_test->key.len;\n+\t\tsession_attrs[i].auth_algorithm =\n+\t\t\t\tRTE_CRYPTO_AUTH_AES_GCM;\n+\t\tsession_attrs[i].auth =\n+\t\t\tRTE_CRYPTO_AUTH_OP_GENERATE;\n+\t\tsession_attrs[i].key_auth_data = NULL;\n+\t\tsession_attrs[i].key_auth_len = 0;\n+\t\tsession_attrs[i].digest_len =\n+\t\t\t\tgcm_test->auth_tag.len;\n+\n+\t\tops_set[i].aad_data = gcm_test->aad.data;\n+\t\tops_set[i].aad_len = gcm_test->aad.len;\n+\t\tops_set[i].iv_data = gcm_test->iv.data;\n+\t\tops_set[i].iv_len = gcm_test->iv.len;\n+\t\tops_set[i].p_data = gcm_test->plaintext.data;\n+\t\tops_set[i].p_len = buf_lengths[i];\n+\t\tops_set[i].c_data = gcm_test->ciphertext.data;\n+\t\tops_set[i].c_len = buf_lengths[i];\n+\t\tops_set[i].t_data = gcm_test->auth_tags[i].data;\n+\t\tops_set[i].t_len = gcm_test->auth_tags[i].len;\n+\n+\t\tparams_set[i].chain = CIPHER_HASH;\n+\t\tparams_set[i].session_attrs = &session_attrs[i];\n+\t\tparams_set[i].symmetric_op = &ops_set[i];\n+\t\tparams_set[i].total_operations = 1000000;\n+\t\tparams_set[i].burst_size = burst_size;\n+\n+\t}\n+\n+\tfor (i = 0; i < RTE_DIM(gcm_tests); i++) {\n+\n+\t\tprintf(\"\\nCipher algo: %s Cipher hash: %s cipher key size: %ub\"\n+\t\t\t\t\" burst size: %u\", \"AES_GCM\", \"AES_GCM\",\n+\t\t\t\tgcm_test->key.len << 3,\tburst_size\n+\t\t\t\t);\n+\t\tprintf(\"\\nBuffer Size(B)\\tOPS(M)\\tThroughput(Gbps)\\t\"\n+\t\t\t\" Retries\\tEmptyPolls\");\n+\n+\t\tfor (j = 0; j < RTE_DIM(buf_lengths); ++j) {\n+\n+\t\t\tparams_set[i].symmetric_op->c_len = buf_lengths[j];\n+\t\t\tparams_set[i].symmetric_op->p_len = buf_lengths[j];\n+\n+\t\t\tops_set[i].t_data = gcm_tests[i]->auth_tags[j].data;\n+\t\t\tops_set[i].t_len = gcm_tests[i]->auth_tags[j].len;\n+\n+\t\t\t/* Run is twice, one for encryption/hash checks,\n+\t\t\t * one for perf\n+\t\t\t */\n+\t\t\tif (perf_AES_GCM(testsuite_params.dev_id, 0,\n+\t\t\t\t\t&params_set[i], 1))\n+\t\t\t\treturn TEST_FAILED;\n+\n+\t\t\tif (perf_AES_GCM(testsuite_params.dev_id, 0,\n+\t\t\t\t\t&params_set[i], 0))\n+\t\t\t\treturn TEST_FAILED;\n+\t\t}\n+\n+\t}\n+\tprintf(\"\\n\");\n+\treturn 0;\n+}\n+\n static struct unit_test_suite cryptodev_testsuite  = {\n \t.suite_name = \"Crypto Device Unit Test Suite\",\n \t.setup = testsuite_setup,\n@@ -2858,11 +3312,24 @@ static struct unit_test_suite cryptodev_testsuite  = {\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\t\ttest_perf_aes_cbc_encrypt_digest_vary_pkt_size),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n+\t\t\t\ttest_perf_AES_GCM),\n+\t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\t\ttest_perf_aes_cbc_vary_burst_size),\n \t\tTEST_CASES_END() /**< NULL terminate unit test array */\n \t}\n };\n-#endif\n+\n+static struct unit_test_suite cryptodev_gcm_testsuite  = {\n+\t.suite_name = \"Crypto Device AESNI GCM Unit Test Suite\",\n+\t.setup = testsuite_setup,\n+\t.teardown = testsuite_teardown,\n+\t.unit_test_cases = {\n+\t\tTEST_CASE_ST(ut_setup, ut_teardown,\n+\t\t\t\ttest_perf_AES_GCM),\n+\t\tTEST_CASES_END() /**< NULL terminate unit test array */\n+\t}\n+};\n+\n static struct unit_test_suite cryptodev_aes_testsuite  = {\n \t.suite_name = \"Crypto Device AESNI MB Unit Test Suite\",\n \t.setup = testsuite_setup,\n@@ -2888,6 +3355,14 @@ static struct unit_test_suite cryptodev_snow3g_testsuite  = {\n };\n \n static int\n+perftest_aesni_gcm_cryptodev(void)\n+{\n+\tgbl_cryptodev_perftest_devtype = RTE_CRYPTODEV_AESNI_GCM_PMD;\n+\n+\treturn unit_test_suite_runner(&cryptodev_gcm_testsuite);\n+}\n+\n+static int\n perftest_aesni_mb_cryptodev(void /*argv __rte_unused, int argc __rte_unused*/)\n {\n \tgbl_cryptodev_perftest_devtype = RTE_CRYPTODEV_AESNI_MB_PMD;\n@@ -2923,3 +3398,4 @@ REGISTER_TEST_COMMAND(cryptodev_aesni_mb_perftest, perftest_aesni_mb_cryptodev);\n REGISTER_TEST_COMMAND(cryptodev_qat_perftest, perftest_qat_cryptodev);\n REGISTER_TEST_COMMAND(cryptodev_sw_snow3g_perftest, perftest_sw_snow3g_cryptodev);\n REGISTER_TEST_COMMAND(cryptodev_qat_snow3g_perftest, perftest_qat_snow3g_cryptodev);\n+REGISTER_TEST_COMMAND(cryptodev_aesni_gcm_perftest, perftest_aesni_gcm_cryptodev);\n",
    "prefixes": [
        "dpdk-dev",
        "v4"
    ]
}