get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/77443/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 77443,
    "url": "https://patches.dpdk.org/api/patches/77443/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20200911154926.583459-1-marcel.d.cornu@intel.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20200911154926.583459-1-marcel.d.cornu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20200911154926.583459-1-marcel.d.cornu@intel.com",
    "date": "2020-09-11T15:49:26",
    "name": "crypto/aesni-mb: support AES-ECB",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "007cef5bfc575cb2c553260246a6f197eb503dec",
    "submitter": {
        "id": 1931,
        "url": "https://patches.dpdk.org/api/people/1931/?format=api",
        "name": "Cornu, Marcel D",
        "email": "marcel.d.cornu@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20200911154926.583459-1-marcel.d.cornu@intel.com/mbox/",
    "series": [
        {
            "id": 12152,
            "url": "https://patches.dpdk.org/api/series/12152/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=12152",
            "date": "2020-09-11T15:49:26",
            "name": "crypto/aesni-mb: support AES-ECB",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/12152/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/77443/comments/",
    "check": "warning",
    "checks": "https://patches.dpdk.org/api/patches/77443/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 2A7AFA04BB;\n\tFri, 11 Sep 2020 17:50:00 +0200 (CEST)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 563A21BFCD;\n\tFri, 11 Sep 2020 17:49:59 +0200 (CEST)",
            "from mga02.intel.com (mga02.intel.com [134.134.136.20])\n by dpdk.org (Postfix) with ESMTP id 583C0E07\n for <dev@dpdk.org>; Fri, 11 Sep 2020 17:49:57 +0200 (CEST)",
            "from orsmga005.jf.intel.com ([10.7.209.41])\n by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 11 Sep 2020 08:49:55 -0700",
            "from silpixa00400565.ir.intel.com (HELO\n silpixa00400565.ger.corp.intel.com) ([10.237.222.249])\n by orsmga005.jf.intel.com with ESMTP; 11 Sep 2020 08:49:53 -0700"
        ],
        "IronPort-SDR": [
            "\n CFw3WduJ+L8QK/cOGZSPLJ0lw1SR8SW/4jP9j15BIlg4YoajXsx+5oUVh9FPm4MqFvab+yYSMB\n Qy2PU2FyRwFQ==",
            "\n AdIs36d9IXO7S7RZeKSMmQdwrn5W/PcYuy3jmtcA5GOc6+/qi4q/NCqd8ynCnUaE2VwsX2bX7c\n Ce2G69yOOclQ=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6000,8403,9741\"; a=\"146478006\"",
            "E=Sophos;i=\"5.76,416,1592895600\"; d=\"scan'208\";a=\"146478006\"",
            "E=Sophos;i=\"5.76,416,1592895600\"; d=\"scan'208\";a=\"481368182\""
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "From": "Marcel Cornu <marcel.d.cornu@intel.com>",
        "To": "declan.doherty@intel.com,\n\tpablo.de.lara.guarch@intel.com",
        "Cc": "=?unknown-8bit?q?dev=40dpdk=2Eorg=2C?=\n\t=?unknown-8bit?b?IOKAnHRvbWFzei5rYW50ZWNraUBpbnRlbC5jb23igJ0s?=\n\t=?unknown-8bit?q?_Marcel_Cornu_=3Cmarcel=2Ed=2Ecornu=40intel=2Ecom=3E?=",
        "Date": "Fri, 11 Sep 2020 16:49:26 +0100",
        "Message-Id": "<20200911154926.583459-1-marcel.d.cornu@intel.com>",
        "X-Mailer": "git-send-email 2.25.4",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Subject": "[dpdk-dev] [PATCH] crypto/aesni-mb: support AES-ECB",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch adds AES-ECB 128, 192 and 256 support to the aesni_mb PMD.\nAES-ECB 128, 192 and 256 test vectors added to cryptodev tests.\n\nSigned-off-by: Marcel Cornu <marcel.d.cornu@intel.com>\n---\n app/test/test_cryptodev_aes_test_vectors.h    | 730 ++++++++++++++++++\n doc/guides/cryptodevs/aesni_mb.rst            |   3 +\n doc/guides/cryptodevs/features/aesni_mb.ini   |   3 +\n doc/guides/rel_notes/release_20_11.rst        |   4 +\n drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c    |   6 +\n .../crypto/aesni_mb/rte_aesni_mb_pmd_ops.c    |  18 +\n 6 files changed, 764 insertions(+)",
    "diff": "diff --git a/app/test/test_cryptodev_aes_test_vectors.h b/app/test/test_cryptodev_aes_test_vectors.h\nindex f56bbdd4a..c192d75a7 100644\n--- a/app/test/test_cryptodev_aes_test_vectors.h\n+++ b/app/test/test_cryptodev_aes_test_vectors.h\n@@ -231,6 +231,666 @@ static const uint8_t ciphertext512_aes128cbc[] = {\n \t0xBB, 0xFF, 0xAE, 0xB5, 0x99, 0x6E, 0xCB, 0x0C\n };\n \n+static const uint8_t plaintext_aes128ecb[] = {\n+\t0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,\n+\t0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,\n+\t0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,\n+\t0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,\n+\t0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,\n+\t0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,\n+\t0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17,\n+\t0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10\n+};\n+\n+static const uint8_t ciphertext_aes128ecb[] = {\n+\t0x3a, 0xd7, 0x7b, 0xb4, 0x0d, 0x7a, 0x36, 0x60,\n+\t0xa8, 0x9e, 0xca, 0xf3, 0x24, 0x66, 0xef, 0x97,\n+\t0xf5, 0xd3, 0xd5, 0x85, 0x03, 0xb9, 0x69, 0x9d,\n+\t0xe7, 0x85, 0x89, 0x5a, 0x96, 0xfd, 0xba, 0xaf,\n+\t0x43, 0xb1, 0xcd, 0x7f, 0x59, 0x8e, 0xce, 0x23,\n+\t0x88, 0x1b, 0x00, 0xe3, 0xed, 0x03, 0x06, 0x88,\n+\t0x7b, 0x0c, 0x78, 0x5e, 0x27, 0xe8, 0xad, 0x3f,\n+\t0x82, 0x23, 0x20, 0x71, 0x04, 0x72, 0x5d, 0xd4\n+};\n+\n+static const uint8_t plaintext_aes192ecb[] = {\n+\t0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,\n+\t0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,\n+\t0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,\n+\t0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,\n+\t0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,\n+\t0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,\n+\t0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17,\n+\t0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10\n+};\n+\n+static const uint8_t ciphertext_aes192ecb[] = {\n+\t0xbd, 0x33, 0x4f, 0x1d, 0x6e, 0x45, 0xf2, 0x5f,\n+\t0xf7, 0x12, 0xa2, 0x14, 0x57, 0x1f, 0xa5, 0xcc,\n+\t0x97, 0x41, 0x04, 0x84, 0x6d, 0x0a, 0xd3, 0xad,\n+\t0x77, 0x34, 0xec, 0xb3, 0xec, 0xee, 0x4e, 0xef,\n+\t0xef, 0x7a, 0xfd, 0x22, 0x70, 0xe2, 0xe6, 0x0a,\n+\t0xdc, 0xe0, 0xba, 0x2f, 0xac, 0xe6, 0x44, 0x4e,\n+\t0x9a, 0x4b, 0x41, 0xba, 0x73, 0x8d, 0x6c, 0x72,\n+\t0xfb, 0x16, 0x69, 0x16, 0x03, 0xc1, 0x8e, 0x0e\n+};\n+\n+static const uint8_t plaintext_aes256ecb[] = {\n+\t0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,\n+\t0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,\n+\t0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,\n+\t0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,\n+\t0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,\n+\t0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,\n+\t0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17,\n+\t0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10\n+};\n+\n+static const uint8_t ciphertext_aes256ecb[] = {\n+\t0xf3, 0xee, 0xd1, 0xbd, 0xb5, 0xd2, 0xa0, 0x3c,\n+\t0x06, 0x4b, 0x5a, 0x7e, 0x3d, 0xb1, 0x81, 0xf8,\n+\t0x59, 0x1c, 0xcb, 0x10, 0xd4, 0x10, 0xed, 0x26,\n+\t0xdc, 0x5b, 0xa7, 0x4a, 0x31, 0x36, 0x28, 0x70,\n+\t0xb6, 0xed, 0x21, 0xb9, 0x9c, 0xa6, 0xf4, 0xf9,\n+\t0xf1, 0x53, 0xe7, 0xb1, 0xbe, 0xaf, 0xed, 0x1d,\n+\t0x23, 0x30, 0x4b, 0x7a, 0x39, 0xf9, 0xf3, 0xff,\n+\t0x06, 0x7d, 0x8d, 0x8f, 0x9e, 0x24, 0xec, 0xc7\n+};\n+\n+static const uint8_t plaintext_aes128ecb_128bytes[] = {\n+\t0xf7, 0xcd, 0x12, 0xfb, 0x4f, 0x8e, 0x50, 0xab,\n+\t0x35, 0x8e, 0x56, 0xf9, 0x83, 0x53, 0x9a, 0x1a,\n+\t0xfc, 0x47, 0x3c, 0x96, 0x01, 0xfe, 0x01, 0x87,\n+\t0xd5, 0xde, 0x46, 0x24, 0x5c, 0x62, 0x8f, 0xba,\n+\t0xba, 0x91, 0x17, 0x8d, 0xba, 0x5a, 0x79, 0xb1,\n+\t0x57, 0x05, 0x4d, 0x08, 0xba, 0x1f, 0x30, 0xd3,\n+\t0x80, 0x40, 0xe9, 0x37, 0xb0, 0xd6, 0x34, 0x87,\n+\t0x33, 0xdd, 0xc0, 0x5b, 0x2d, 0x58, 0x1d, 0x2a,\n+\t0x7b, 0xb6, 0xe3, 0xd0, 0xc8, 0xa0, 0x7a, 0x69,\n+\t0xc8, 0x5d, 0x10, 0xa2, 0xc3, 0x39, 0xca, 0xaf,\n+\t0x40, 0xdc, 0xc7, 0xcb, 0xff, 0x18, 0x7d, 0x51,\n+\t0x06, 0x28, 0x28, 0x1f, 0x3a, 0x9c, 0x18, 0x7d,\n+\t0x5b, 0xb5, 0xe9, 0x20, 0xc2, 0xae, 0x17, 0x7f,\n+\t0xd1, 0x65, 0x7a, 0x75, 0xcf, 0x21, 0xa0, 0x1e,\n+\t0x17, 0x1b, 0xf7, 0xe8, 0x62, 0x5f, 0xaf, 0x34,\n+\t0x7f, 0xd8, 0x18, 0x4a, 0x94, 0xf2, 0x33, 0x90\n+};\n+\n+static const uint8_t ciphertext_aes128ecb_128bytes[] = {\n+\t0x48, 0xa0, 0xe8, 0x0a, 0x89, 0x99, 0xab, 0xb5,\n+\t0x66, 0x6d, 0x68, 0x23, 0x43, 0x40, 0x1f, 0x26,\n+\t0xac, 0x52, 0xc4, 0x7b, 0x09, 0x0a, 0x8f, 0xc0,\n+\t0x38, 0x00, 0xf5, 0x48, 0x3a, 0xfd, 0xcd, 0x7e,\n+\t0x21, 0xe7, 0xf8, 0xf6, 0xc2, 0xa7, 0x4c, 0x1c,\n+\t0x6e, 0x83, 0x57, 0xf4, 0xa4, 0xb0, 0xc0, 0x5f,\n+\t0x36, 0x73, 0x22, 0xff, 0x33, 0x44, 0xab, 0xeb,\n+\t0x96, 0xa8, 0xe0, 0x37, 0x65, 0x81, 0x6b, 0x82,\n+\t0x89, 0xcd, 0xcc, 0xac, 0x33, 0x18, 0x7d, 0x43,\n+\t0x0e, 0x79, 0x53, 0x30, 0x21, 0x4c, 0x95, 0x18,\n+\t0xb6, 0xc9, 0xea, 0x5c, 0x6f, 0xa1, 0x10, 0xa3,\n+\t0x51, 0x0e, 0x67, 0x8c, 0x1c, 0x9d, 0xf1, 0x57,\n+\t0xeb, 0xf6, 0xad, 0x4f, 0xf2, 0x55, 0xe8, 0x11,\n+\t0x6f, 0xaa, 0x4d, 0xe5, 0x18, 0x3d, 0xc3, 0x14,\n+\t0xf9, 0x40, 0xfa, 0x86, 0x9d, 0xaf, 0xff, 0xfc,\n+\t0x78, 0xba, 0xbe, 0x61, 0xf8, 0xd1, 0x00, 0x8d\n+};\n+\n+static const uint8_t plaintext_aes192ecb_192bytes[] = {\n+\t0x19, 0x08, 0xa3, 0x58, 0x17, 0x14, 0x70, 0x5a,\n+\t0xb8, 0xab, 0x4f, 0x5f, 0xa4, 0x25, 0x2b, 0xec,\n+\t0xb6, 0x74, 0x0b, 0x9d, 0x56, 0x3b, 0xaf, 0xa3,\n+\t0xa4, 0x2d, 0x3e, 0x1f, 0x18, 0x84, 0x3b, 0x4f,\n+\t0x48, 0xd9, 0xa3, 0xfe, 0x59, 0x1e, 0x80, 0x67,\n+\t0x44, 0x35, 0x26, 0x00, 0x78, 0xda, 0x68, 0xfa,\n+\t0x61, 0x9c, 0xd8, 0x8e, 0x5c, 0xc1, 0xff, 0xeb,\n+\t0x9c, 0x7d, 0xe7, 0xa9, 0x38, 0xeb, 0x66, 0xf8,\n+\t0x6a, 0x46, 0x71, 0x51, 0x02, 0xba, 0x8d, 0x70,\n+\t0x55, 0x5b, 0x60, 0xc6, 0x4c, 0xae, 0xda, 0x2e,\n+\t0x17, 0xbb, 0x65, 0xef, 0x60, 0x85, 0x9e, 0x77,\n+\t0xe5, 0x83, 0xef, 0x30, 0x08, 0x3a, 0xba, 0x80,\n+\t0x28, 0xc0, 0xa1, 0x93, 0x4c, 0x2a, 0x0b, 0xe1,\n+\t0xcb, 0xd0, 0xac, 0x72, 0x72, 0x1d, 0x96, 0x76,\n+\t0x0e, 0xc0, 0xec, 0x7d, 0x84, 0xfd, 0xee, 0x08,\n+\t0xa1, 0x11, 0x20, 0x0d, 0x59, 0x5c, 0x06, 0x3f,\n+\t0xa3, 0xf1, 0xd7, 0xa3, 0x1d, 0x29, 0xc3, 0xaa,\n+\t0x05, 0x2b, 0x74, 0x8c, 0x73, 0x60, 0x65, 0x43,\n+\t0x76, 0xd4, 0xd7, 0x7b, 0x5f, 0x40, 0xf4, 0x77,\n+\t0xe1, 0xcc, 0x85, 0x37, 0x1c, 0xd8, 0xda, 0x91,\n+\t0xf0, 0x40, 0xb2, 0x43, 0x2d, 0x87, 0x51, 0xd0,\n+\t0xce, 0x27, 0xa6, 0x60, 0xac, 0x67, 0xea, 0x8b,\n+\t0xae, 0x46, 0x2e, 0x78, 0x06, 0x09, 0x8a, 0x82,\n+\t0xb0, 0x0d, 0x57, 0x56, 0x82, 0xfe, 0x89, 0xd2\n+};\n+\n+static const uint8_t ciphertext_aes192ecb_192bytes[] = {\n+\t0xcc, 0xe2, 0x3f, 0xc3, 0x12, 0x41, 0x31, 0x63,\n+\t0x03, 0x3a, 0x3c, 0xfe, 0x76, 0x55, 0xd2, 0x26,\n+\t0xf0, 0xc9, 0xb5, 0xc6, 0xf0, 0x1e, 0xc3, 0x72,\n+\t0xfb, 0x64, 0x94, 0x7d, 0xf1, 0x5e, 0x2a, 0x9e,\n+\t0x0d, 0x9a, 0x7a, 0xe0, 0xbc, 0x7b, 0xa6, 0x65,\n+\t0x41, 0xc0, 0xa0, 0x9d, 0xb1, 0xb1, 0x09, 0x99,\n+\t0x6e, 0xe7, 0x25, 0x5e, 0x64, 0x2b, 0x74, 0xfa,\n+\t0xa1, 0x9a, 0x03, 0x33, 0x88, 0x81, 0x27, 0x48,\n+\t0xdd, 0x53, 0x77, 0x0b, 0xef, 0xd9, 0x2f, 0xfa,\n+\t0xc8, 0x50, 0x0e, 0x08, 0xa1, 0x45, 0x12, 0x82,\n+\t0x2b, 0xfb, 0x85, 0x5a, 0x39, 0x8c, 0x71, 0x32,\n+\t0x59, 0x27, 0x37, 0x53, 0xce, 0x3e, 0xae, 0x00,\n+\t0x45, 0x53, 0xfd, 0xaf, 0xa5, 0xd1, 0x1a, 0xe9,\n+\t0xa4, 0x1b, 0xe3, 0x99, 0xde, 0xcd, 0x03, 0x36,\n+\t0x6b, 0x72, 0x43, 0x76, 0x04, 0xa8, 0xf9, 0x83,\n+\t0xef, 0x9e, 0x57, 0x75, 0x36, 0x0e, 0x99, 0xe1,\n+\t0x79, 0x2b, 0x2b, 0x96, 0x01, 0x10, 0xb8, 0xf6,\n+\t0x4a, 0xa6, 0x13, 0xab, 0x7f, 0x55, 0x60, 0xf0,\n+\t0xc9, 0x5c, 0x81, 0xa7, 0x96, 0x99, 0xb4, 0x55,\n+\t0x41, 0x48, 0xf1, 0xd4, 0xa1, 0xb4, 0x76, 0xb5,\n+\t0x35, 0xe1, 0x02, 0x8e, 0x09, 0xb2, 0x6c, 0x11,\n+\t0x3f, 0xfb, 0x04, 0x47, 0x98, 0xab, 0x9b, 0x55,\n+\t0xc3, 0xa9, 0x2a, 0x64, 0x32, 0x5a, 0x69, 0x96,\n+\t0x28, 0x8c, 0x5b, 0xe3, 0xb2, 0x60, 0x82, 0xec\n+};\n+\n+static const uint8_t plaintext_aes256ecb_256bytes[] = {\n+\t0x0b, 0xe5, 0x48, 0xa6, 0xa1, 0xbc, 0xac, 0x81,\n+\t0x80, 0x06, 0x5f, 0xae, 0x1e, 0x3f, 0x55, 0x73,\n+\t0x6d, 0x36, 0x7f, 0x57, 0x3d, 0xa4, 0x4a, 0x6b,\n+\t0xb6, 0x65, 0x2f, 0xb7, 0xe8, 0x85, 0x47, 0xe2,\n+\t0x41, 0x42, 0xc2, 0x4e, 0x58, 0xf1, 0xde, 0x42,\n+\t0x9f, 0x15, 0x4c, 0xaf, 0xea, 0x04, 0x20, 0xd0,\n+\t0x1a, 0x19, 0x36, 0x74, 0x71, 0x12, 0x72, 0x1b,\n+\t0xdb, 0x18, 0xf9, 0x0b, 0xb3, 0xf3, 0x63, 0xd4,\n+\t0x62, 0x52, 0x8b, 0x63, 0x0f, 0x6b, 0x4d, 0xb9,\n+\t0x70, 0xd6, 0x91, 0xa0, 0x43, 0x3f, 0x46, 0xfe,\n+\t0x43, 0xbb, 0xb8, 0xdc, 0x5e, 0xdb, 0xd4, 0x1f,\n+\t0xf0, 0x17, 0x94, 0x25, 0xee, 0x55, 0x67, 0xbf,\n+\t0x4d, 0xda, 0x9d, 0xe7, 0x4b, 0xc6, 0x7a, 0xcf,\n+\t0x8f, 0xd7, 0xbb, 0x29, 0x6e, 0x26, 0xd4, 0xc3,\n+\t0x08, 0x9b, 0x67, 0x15, 0xe9, 0x2d, 0x9f, 0x2d,\n+\t0x3c, 0x76, 0x26, 0xd3, 0xda, 0xfe, 0x6e, 0x73,\n+\t0x9d, 0x09, 0x60, 0x4b, 0x35, 0x60, 0xdb, 0x77,\n+\t0xb6, 0xc0, 0x45, 0x91, 0xf9, 0x14, 0x8a, 0x7a,\n+\t0xdd, 0xe2, 0xf1, 0xdf, 0x8f, 0x12, 0x4f, 0xd7,\n+\t0x75, 0xd6, 0x9a, 0x17, 0xda, 0x76, 0x88, 0xf0,\n+\t0xfa, 0x44, 0x27, 0xbe, 0x61, 0xaf, 0x55, 0x9f,\n+\t0xc7, 0xf0, 0x76, 0x77, 0xde, 0xca, 0xd1, 0x47,\n+\t0x51, 0x55, 0xb1, 0xbf, 0xfa, 0x1e, 0xca, 0x28,\n+\t0x17, 0x70, 0xf3, 0xb5, 0xd4, 0x32, 0x47, 0x04,\n+\t0xe0, 0x92, 0xd8, 0xa5, 0x03, 0x69, 0x46, 0x99,\n+\t0x7f, 0x1e, 0x3f, 0xb2, 0x93, 0x36, 0xa3, 0x88,\n+\t0x75, 0x07, 0x68, 0xb8, 0x33, 0xce, 0x17, 0x3f,\n+\t0x5c, 0xb7, 0x1e, 0x93, 0x38, 0xc5, 0x1d, 0x79,\n+\t0x86, 0x7c, 0x9d, 0x9e, 0x2f, 0x69, 0x38, 0x0f,\n+\t0x97, 0x5c, 0x67, 0xbf, 0xa0, 0x8d, 0x37, 0x0b,\n+\t0xd3, 0xb1, 0x04, 0x87, 0x1d, 0x74, 0xfe, 0x30,\n+\t0xfb, 0xd0, 0x22, 0x92, 0xf9, 0xf3, 0x23, 0xc9\n+};\n+\n+static const uint8_t ciphertext_aes256ecb_256bytes[] = {\n+\t0x4b, 0xc0, 0x1f, 0x80, 0xf5, 0xc7, 0xe8, 0xf5,\n+\t0xc9, 0xd0, 0x3c, 0x86, 0x50, 0x78, 0x21, 0xce,\n+\t0x01, 0xec, 0x91, 0x00, 0xc9, 0xf8, 0x73, 0x43,\n+\t0x2f, 0x73, 0x8a, 0x6d, 0xee, 0xed, 0x2d, 0x40,\n+\t0x17, 0x16, 0x93, 0x15, 0xac, 0xed, 0x28, 0x61,\n+\t0xb0, 0x0f, 0xa2, 0xe1, 0xd3, 0x80, 0x51, 0xdf,\n+\t0x73, 0xce, 0x48, 0x4c, 0x1c, 0xc1, 0x8b, 0xc9,\n+\t0x9e, 0x5c, 0x48, 0x07, 0xa0, 0xf6, 0x29, 0xf8,\n+\t0x63, 0x87, 0xe4, 0xe7, 0x8b, 0xf8, 0xcf, 0x58,\n+\t0xda, 0x57, 0x62, 0x11, 0x2e, 0x6e, 0x91, 0x7e,\n+\t0xc7, 0x73, 0xdb, 0x27, 0x3c, 0x64, 0x72, 0x52,\n+\t0xe3, 0x27, 0x84, 0x1f, 0x73, 0x3f, 0xf4, 0x94,\n+\t0xd2, 0xdd, 0x93, 0x33, 0x65, 0x91, 0x98, 0x89,\n+\t0x13, 0xa9, 0x2b, 0x0d, 0x6f, 0x56, 0x51, 0x15,\n+\t0x07, 0xc6, 0xa7, 0x36, 0x8f, 0x0c, 0xd6, 0xc2,\n+\t0x07, 0x06, 0x65, 0x7a, 0xf8, 0x94, 0xa6, 0x75,\n+\t0x48, 0x4c, 0xcc, 0xa5, 0xa9, 0x91, 0x04, 0x2f,\n+\t0x7b, 0x89, 0x46, 0xd2, 0x87, 0xcb, 0xd6, 0x1b,\n+\t0xf3, 0x1e, 0xa7, 0xe5, 0x09, 0xcf, 0x75, 0x05,\n+\t0x9f, 0xc9, 0xac, 0xcc, 0x61, 0x15, 0x2d, 0x2e,\n+\t0x2c, 0x0a, 0x57, 0x4d, 0x33, 0x17, 0x6b, 0x22,\n+\t0x9e, 0x92, 0xc5, 0x81, 0xce, 0x9d, 0x52, 0x68,\n+\t0x7d, 0x98, 0xe1, 0x23, 0x70, 0xc5, 0x19, 0x3e,\n+\t0x91, 0xfc, 0xc6, 0xd7, 0x67, 0x5f, 0xbb, 0x57,\n+\t0x20, 0x96, 0x3f, 0x1f, 0x9f, 0x64, 0xe9, 0xb1,\n+\t0x51, 0xfd, 0x8c, 0xc1, 0x0f, 0x50, 0xbe, 0x43,\n+\t0x5f, 0x90, 0xb4, 0xd1, 0xb6, 0x41, 0x7c, 0x37,\n+\t0x92, 0x71, 0xda, 0x9d, 0xfd, 0xee, 0x69, 0x8c,\n+\t0x24, 0x18, 0xe8, 0x81, 0x60, 0xe2, 0x89, 0x33,\n+\t0x42, 0xd4, 0x1b, 0x6a, 0xcb, 0x4a, 0x5b, 0x00,\n+\t0x01, 0x4f, 0x11, 0x47, 0x0f, 0x57, 0xb0, 0x90,\n+\t0xf0, 0xed, 0xb0, 0x34, 0x2e, 0x9f, 0x81, 0x6c\n+};\n+\n+static const uint8_t plaintext_aes128ecb_1008bytes[] = {\n+\t0xdd, 0x14, 0xde, 0x30, 0xe0, 0xfd, 0x7b, 0x2a,\n+\t0x94, 0x8e, 0x28, 0xa0, 0xf6, 0x93, 0x6e, 0xf5,\n+\t0x92, 0x65, 0x1d, 0x5e, 0x78, 0x2a, 0x9d, 0x39,\n+\t0xfc, 0xb8, 0x6d, 0x8b, 0xa5, 0xf4, 0x4b, 0x21,\n+\t0xdd, 0x4e, 0xe9, 0xeb, 0xd7, 0xa7, 0xa1, 0x59,\n+\t0xdc, 0x4c, 0x5e, 0xcc, 0x83, 0xab, 0xd3, 0x45,\n+\t0xfe, 0x2c, 0x73, 0x23, 0xea, 0x45, 0xcb, 0x0c,\n+\t0x12, 0x67, 0x28, 0xcd, 0xef, 0x4e, 0xca, 0xe2,\n+\t0x1d, 0x92, 0x82, 0xd8, 0x0f, 0xa9, 0x36, 0x23,\n+\t0x6d, 0x38, 0x68, 0xac, 0xa0, 0xeb, 0xdc, 0xcc,\n+\t0xdf, 0xb8, 0x3a, 0x53, 0x04, 0x1a, 0x55, 0x27,\n+\t0x8e, 0x22, 0x86, 0x8c, 0xbd, 0xdc, 0x6b, 0x12,\n+\t0x9c, 0x69, 0xd2, 0x7a, 0x4b, 0x52, 0x5d, 0x76,\n+\t0x34, 0xb9, 0x5e, 0x30, 0x0a, 0x8d, 0x1e, 0xf1,\n+\t0x27, 0xda, 0x5b, 0xb9, 0x5e, 0xbf, 0x65, 0x34,\n+\t0x00, 0xb6, 0xd2, 0xb0, 0x89, 0x12, 0xb6, 0x35,\n+\t0xae, 0x27, 0x7f, 0x11, 0xe9, 0xf9, 0x1c, 0x71,\n+\t0xc9, 0x50, 0xfe, 0xd4, 0x76, 0x50, 0x95, 0xf7,\n+\t0xe1, 0x1c, 0x14, 0xcd, 0x67, 0x0f, 0xf0, 0x6d,\n+\t0xa2, 0x93, 0x7b, 0x2c, 0x8d, 0x83, 0x5c, 0xff,\n+\t0xe4, 0x95, 0xf3, 0xa1, 0xfd, 0x00, 0x77, 0x68,\n+\t0x41, 0xb4, 0xfb, 0x81, 0xf4, 0x61, 0x1a, 0x84,\n+\t0x5a, 0x53, 0xc3, 0xdc, 0xba, 0x0d, 0x67, 0x2e,\n+\t0xcf, 0xf2, 0x30, 0xf5, 0x1d, 0xe9, 0xc4, 0x2c,\n+\t0xac, 0x1f, 0xa7, 0x9c, 0x64, 0xfd, 0x45, 0x30,\n+\t0x1b, 0xa1, 0x3b, 0x3d, 0xc7, 0xf5, 0xf9, 0xbb,\n+\t0xba, 0x99, 0xa4, 0x12, 0x6e, 0x4e, 0xea, 0x0b,\n+\t0x29, 0x7f, 0xcd, 0x84, 0x64, 0x50, 0x40, 0xb7,\n+\t0x6a, 0x24, 0x29, 0xa4, 0xa7, 0xa1, 0xef, 0xa9,\n+\t0xcf, 0xdf, 0x09, 0xff, 0xaa, 0x17, 0x5d, 0x82,\n+\t0x74, 0xf5, 0xae, 0xd0, 0xe9, 0xec, 0xad, 0x5e,\n+\t0xa7, 0x84, 0xda, 0xe7, 0x33, 0x58, 0x7e, 0x00,\n+\t0x45, 0x5f, 0xbb, 0x15, 0xa3, 0x65, 0x0e, 0xf5,\n+\t0x7e, 0x27, 0xe7, 0x04, 0x52, 0x58, 0x81, 0xd0,\n+\t0xee, 0x8f, 0xaf, 0xe2, 0x3c, 0xbe, 0x08, 0x97,\n+\t0x8a, 0x97, 0x12, 0xb0, 0x09, 0xfe, 0xa5, 0xeb,\n+\t0xd1, 0x9c, 0x30, 0xe8, 0x9a, 0x3f, 0xe0, 0x38,\n+\t0x34, 0x2b, 0xad, 0xb7, 0xc4, 0xda, 0x54, 0xab,\n+\t0x97, 0x9c, 0x46, 0x2b, 0x2c, 0x0b, 0xb3, 0x49,\n+\t0xcd, 0x9d, 0x32, 0x38, 0x3c, 0x1a, 0x49, 0xdc,\n+\t0x2f, 0xe7, 0xcd, 0x8a, 0xb0, 0x76, 0xcf, 0x30,\n+\t0xea, 0x0b, 0xb0, 0xb7, 0x63, 0xed, 0xb2, 0x8c,\n+\t0xc9, 0x2c, 0xb7, 0x75, 0xa8, 0xf6, 0x63, 0xb6,\n+\t0xcd, 0xb5, 0x63, 0xfb, 0x5f, 0x89, 0xae, 0x3d,\n+\t0x33, 0x73, 0xaf, 0xde, 0xcb, 0x37, 0x0a, 0x50,\n+\t0x6f, 0xae, 0xf3, 0xa6, 0x79, 0x85, 0xdd, 0xc5,\n+\t0x24, 0xc5, 0x29, 0x23, 0x64, 0xef, 0x43, 0xd7,\n+\t0xc4, 0xab, 0xd8, 0xb0, 0x84, 0x26, 0x6b, 0xe8,\n+\t0xb1, 0x5d, 0xb5, 0x69, 0xfb, 0x97, 0x0e, 0x20,\n+\t0xb3, 0xc1, 0x60, 0xad, 0x1a, 0xd2, 0xd6, 0x3a,\n+\t0x73, 0x08, 0xf0, 0x47, 0x5f, 0xcf, 0x15, 0xf7,\n+\t0x7b, 0xf3, 0x69, 0x08, 0x5a, 0x6b, 0x9f, 0xc7,\n+\t0x12, 0xa1, 0xf0, 0xfb, 0x91, 0xc9, 0x07, 0x61,\n+\t0x21, 0xa0, 0x30, 0x4c, 0x16, 0x81, 0xcd, 0x3c,\n+\t0x61, 0xe8, 0x96, 0x91, 0x30, 0xdd, 0x0c, 0x0e,\n+\t0x0b, 0xa1, 0x33, 0x95, 0x67, 0x99, 0xd6, 0x1e,\n+\t0x1a, 0xb3, 0x12, 0xfd, 0xad, 0x46, 0x48, 0x87,\n+\t0x5e, 0xe8, 0xd4, 0xf5, 0xac, 0xdf, 0xa7, 0x37,\n+\t0xb8, 0xa1, 0x62, 0x8c, 0xb8, 0xb6, 0xb0, 0x69,\n+\t0x63, 0x29, 0x60, 0x64, 0x26, 0xc3, 0xf8, 0x18,\n+\t0x8e, 0x46, 0xa0, 0xc5, 0x45, 0x5c, 0x08, 0x2a,\n+\t0xed, 0x29, 0x84, 0x11, 0xea, 0x59, 0xc0, 0x16,\n+\t0xe2, 0x04, 0x30, 0x63, 0x22, 0x87, 0xb6, 0xc7,\n+\t0x81, 0xa6, 0x58, 0xc0, 0xb2, 0xb0, 0x7d, 0xbc,\n+\t0x16, 0x44, 0x6e, 0x5d, 0x6d, 0xce, 0x2a, 0xe0,\n+\t0x20, 0x69, 0x35, 0xa1, 0x5d, 0x17, 0x48, 0x55,\n+\t0x88, 0xfe, 0xde, 0x34, 0xe7, 0x18, 0xbf, 0x7e,\n+\t0x0a, 0x1c, 0x32, 0x88, 0xab, 0xde, 0xe1, 0x02,\n+\t0x61, 0x09, 0x58, 0x96, 0xef, 0x16, 0x73, 0xac,\n+\t0xc0, 0x5c, 0x15, 0xca, 0x9b, 0xea, 0x0e, 0x05,\n+\t0x97, 0x88, 0x09, 0xc5, 0xd0, 0x95, 0x90, 0xae,\n+\t0xa5, 0xb5, 0x28, 0xc6, 0x5a, 0x7b, 0xb3, 0xcc,\n+\t0xae, 0x57, 0x71, 0x83, 0x56, 0x57, 0xca, 0xe8,\n+\t0x8b, 0x21, 0x0c, 0x37, 0x1d, 0xde, 0x85, 0xe2,\n+\t0x1b, 0xa2, 0x38, 0xa0, 0xc5, 0xc7, 0x98, 0x7b,\n+\t0xf9, 0x5e, 0x6a, 0x68, 0xb3, 0xed, 0x49, 0x5e,\n+\t0x46, 0xb9, 0xc9, 0xf6, 0x34, 0xa6, 0x0e, 0xac,\n+\t0x90, 0x72, 0xcf, 0xf8, 0x5b, 0x48, 0x13, 0x40,\n+\t0x7a, 0xce, 0xfd, 0x3c, 0x16, 0xff, 0xb5, 0xea,\n+\t0xb2, 0x56, 0x47, 0xcc, 0x9f, 0xbc, 0xae, 0x4a,\n+\t0xc8, 0xa5, 0x59, 0x57, 0x01, 0xd7, 0x9f, 0xd7,\n+\t0xbf, 0x13, 0xb1, 0xbf, 0xb7, 0x9a, 0xa0, 0xa1,\n+\t0xc6, 0x66, 0x61, 0x96, 0xf2, 0xcd, 0x8c, 0xcb,\n+\t0x3c, 0x67, 0xb5, 0xed, 0xb7, 0xa2, 0x54, 0x84,\n+\t0x3c, 0xcb, 0x7e, 0xb3, 0x97, 0x05, 0xcb, 0x8f,\n+\t0xa9, 0xc6, 0x3c, 0xa2, 0xbd, 0xbf, 0x3a, 0xb8,\n+\t0x92, 0x08, 0x01, 0xea, 0xfd, 0x55, 0x2f, 0x27,\n+\t0x2a, 0x82, 0x38, 0x26, 0x1d, 0x81, 0x19, 0x33,\n+\t0x75, 0x3c, 0xa2, 0x13, 0x1e, 0x58, 0x9f, 0x0b,\n+\t0x08, 0x5d, 0x7a, 0x2c, 0x9a, 0xd1, 0xa5, 0x4c,\n+\t0x41, 0xb4, 0x1d, 0xf8, 0x42, 0x08, 0x87, 0xdd,\n+\t0x8e, 0xc9, 0x05, 0xd2, 0x8c, 0xba, 0x93, 0x28,\n+\t0xbe, 0x4a, 0x14, 0x13, 0x2a, 0x58, 0xf0, 0x1c,\n+\t0xac, 0xc1, 0xc4, 0x49, 0xbc, 0xe1, 0xda, 0xb6,\n+\t0x2d, 0x06, 0x98, 0x32, 0xea, 0xa3, 0x89, 0x11,\n+\t0xca, 0x5f, 0x3e, 0xda, 0x24, 0xe2, 0xdb, 0x1e,\n+\t0xca, 0xf3, 0xc0, 0xc7, 0x64, 0xee, 0x4b, 0x3d,\n+\t0xa2, 0xee, 0x69, 0xb0, 0x3f, 0x2c, 0xd5, 0x49,\n+\t0xba, 0x2d, 0x45, 0x7d, 0xdd, 0xb0, 0x0d, 0xc5,\n+\t0xe0, 0x57, 0x95, 0xbe, 0xf8, 0x4a, 0x11, 0x46,\n+\t0x4c, 0xbb, 0xdf, 0xa8, 0x5a, 0xf9, 0xff, 0x0e,\n+\t0x31, 0xa9, 0x50, 0x5d, 0xc4, 0xb3, 0x3d, 0x09,\n+\t0x46, 0x33, 0x39, 0x31, 0xd5, 0xb3, 0xe5, 0x91,\n+\t0xcf, 0xca, 0x8a, 0xe0, 0xc2, 0x8e, 0xea, 0xbe,\n+\t0x54, 0x64, 0x78, 0x0c, 0x25, 0x1c, 0x17, 0xbc,\n+\t0x49, 0xf9, 0xc0, 0x30, 0x5f, 0x08, 0x04, 0x9d,\n+\t0xb5, 0xe4, 0xeb, 0x9e, 0xe5, 0x1e, 0x6d, 0xbc,\n+\t0x7b, 0xe7, 0xf0, 0xd1, 0xa0, 0x01, 0x18, 0x51,\n+\t0x4f, 0x64, 0xc3, 0x9c, 0x70, 0x25, 0x4f, 0xed,\n+\t0xc7, 0xbc, 0x19, 0x00, 0x09, 0x22, 0x97, 0x5d,\n+\t0x6f, 0xe4, 0x47, 0x98, 0x05, 0xcd, 0xcc, 0xde,\n+\t0xd5, 0xe3, 0xaf, 0xa3, 0xde, 0x69, 0x99, 0x2a,\n+\t0xd1, 0x28, 0x4d, 0x7c, 0x89, 0xa0, 0xdb, 0xae,\n+\t0xf9, 0xf1, 0x4a, 0x46, 0xdf, 0xbe, 0x1d, 0x37,\n+\t0xf2, 0xd5, 0x36, 0x4a, 0x54, 0xe8, 0xc4, 0xfb,\n+\t0x57, 0x77, 0x09, 0x05, 0x31, 0x99, 0xaf, 0x9a,\n+\t0x17, 0xd1, 0x20, 0x93, 0x31, 0x89, 0xff, 0xed,\n+\t0x0f, 0xf8, 0xed, 0xb3, 0xcf, 0x4c, 0x9a, 0x74,\n+\t0xbb, 0x00, 0x36, 0x41, 0xd1, 0x13, 0x68, 0x73,\n+\t0x78, 0x63, 0x42, 0xdd, 0x99, 0x15, 0x9a, 0xf4,\n+\t0xe1, 0xad, 0x6d, 0xf6, 0x5e, 0xca, 0x20, 0x24,\n+\t0xd7, 0x9d, 0x2f, 0x58, 0x97, 0xf7, 0xde, 0x31,\n+\t0x51, 0xa3, 0x1c, 0xe2, 0x66, 0x24, 0x4b, 0xa1,\n+\t0x56, 0x02, 0x32, 0xf4, 0x89, 0xf3, 0x86, 0x9a,\n+\t0x85, 0xda, 0x95, 0xa8, 0x7f, 0x6a, 0x77, 0x02,\n+\t0x3a, 0xba, 0xe0, 0xbe, 0x34, 0x5c, 0x9a, 0x1a\n+};\n+\n+static const uint8_t ciphertext_aes128ecb_1008bytes[] = {\n+\t0x62, 0xa1, 0xcc, 0x1e, 0x1b, 0xc3, 0xb1, 0x11,\n+\t0xb5, 0x11, 0x4c, 0x37, 0xbf, 0xd0, 0x0c, 0xef,\n+\t0x36, 0x9f, 0x99, 0x49, 0x38, 0xc2, 0x62, 0xbd,\n+\t0x3e, 0x03, 0xd1, 0x02, 0xa2, 0x18, 0xdc, 0x58,\n+\t0x9c, 0x01, 0x99, 0xd8, 0x47, 0xeb, 0x27, 0xce,\n+\t0x76, 0x84, 0xa5, 0xab, 0xb7, 0x9b, 0xbb, 0x98,\n+\t0xc9, 0x84, 0x02, 0x6e, 0x32, 0x65, 0xc9, 0xcb,\n+\t0xca, 0xc7, 0xa5, 0x95, 0x11, 0xcc, 0x0a, 0x9d,\n+\t0x5e, 0xea, 0xba, 0x59, 0xef, 0x25, 0xc0, 0x2d,\n+\t0x8b, 0xa2, 0xec, 0x2f, 0x34, 0xea, 0x7c, 0xef,\n+\t0xee, 0x2a, 0x57, 0x80, 0xc4, 0xca, 0x5e, 0x08,\n+\t0x8c, 0x12, 0x13, 0x39, 0xd1, 0xc7, 0x96, 0x93,\n+\t0x41, 0x22, 0x97, 0x1c, 0x7d, 0xe0, 0x47, 0xab,\n+\t0xfa, 0xd7, 0xc6, 0x38, 0x5a, 0x39, 0xdb, 0x4c,\n+\t0xd4, 0x6d, 0x50, 0x2b, 0x8f, 0xb1, 0x92, 0x06,\n+\t0x01, 0xbf, 0xdc, 0x14, 0x5c, 0x32, 0xee, 0xb0,\n+\t0x6a, 0x36, 0xe8, 0xe9, 0xf3, 0x12, 0x9f, 0x1f,\n+\t0x00, 0xe5, 0x25, 0x3b, 0x52, 0x74, 0xba, 0x50,\n+\t0x17, 0x81, 0x60, 0x5c, 0x15, 0xec, 0x4d, 0xb0,\n+\t0x6a, 0xa1, 0xdd, 0xb4, 0xa2, 0x71, 0x01, 0xb8,\n+\t0x8b, 0x59, 0x93, 0x58, 0x23, 0xd6, 0x38, 0xbf,\n+\t0x49, 0x94, 0xb7, 0x6e, 0x22, 0x75, 0x68, 0x1f,\n+\t0x15, 0x2c, 0xc4, 0x46, 0x44, 0x35, 0xc8, 0x7a,\n+\t0x40, 0x2e, 0x55, 0x3f, 0x67, 0x4d, 0x12, 0x21,\n+\t0xf6, 0xb1, 0x20, 0x47, 0x4f, 0x35, 0xe4, 0x96,\n+\t0xf9, 0xa2, 0xdc, 0x4c, 0xe3, 0xa2, 0x13, 0x41,\n+\t0xed, 0x6d, 0x86, 0x80, 0x23, 0xe5, 0x2a, 0xd1,\n+\t0xa0, 0x69, 0x8f, 0x7e, 0x22, 0x3f, 0xf1, 0x65,\n+\t0x9f, 0xd7, 0x86, 0xa8, 0x78, 0x57, 0x49, 0x74,\n+\t0x91, 0x52, 0x91, 0xe7, 0x1e, 0xe2, 0x14, 0xe9,\n+\t0x88, 0xe1, 0x67, 0x12, 0x3d, 0x0a, 0x22, 0x31,\n+\t0x56, 0x2e, 0x36, 0xd4, 0x45, 0xc9, 0x9b, 0x7b,\n+\t0x09, 0x53, 0x55, 0x36, 0xed, 0xa3, 0xc2, 0x22,\n+\t0xac, 0x00, 0x5e, 0x57, 0xc8, 0x40, 0x65, 0xd2,\n+\t0x62, 0x61, 0x35, 0xf2, 0xe8, 0x4f, 0xb3, 0x9d,\n+\t0x2c, 0xb2, 0x12, 0x5e, 0x15, 0x47, 0xd6, 0x1c,\n+\t0x99, 0x80, 0xe0, 0x1c, 0x09, 0x28, 0xa0, 0x7e,\n+\t0x6c, 0x96, 0xc9, 0x62, 0x33, 0xd3, 0xbe, 0x53,\n+\t0x16, 0xa0, 0xf2, 0xa9, 0x42, 0x1c, 0x81, 0xa3,\n+\t0x35, 0x9b, 0x93, 0x9e, 0xc6, 0xc0, 0x83, 0x03,\n+\t0xb7, 0x39, 0x66, 0xc9, 0x86, 0xf8, 0x8d, 0xc0,\n+\t0xe2, 0x88, 0xb4, 0x1f, 0x5d, 0x15, 0x80, 0x60,\n+\t0x2d, 0x53, 0x1d, 0x60, 0x07, 0xbc, 0x72, 0x11,\n+\t0xd0, 0x0e, 0xcb, 0x70, 0x9c, 0xa0, 0x48, 0x56,\n+\t0x21, 0x5f, 0x18, 0xdd, 0xa3, 0x1d, 0xdb, 0xe0,\n+\t0x41, 0x0c, 0x9e, 0xb9, 0xa2, 0x7e, 0x32, 0xb3,\n+\t0x3e, 0x91, 0x9d, 0xf2, 0xa6, 0x0d, 0x8c, 0xea,\n+\t0xae, 0x44, 0xb2, 0x0f, 0x11, 0x35, 0x27, 0x2e,\n+\t0xb6, 0x3d, 0xe9, 0x63, 0x86, 0x2e, 0x81, 0xdc,\n+\t0xfa, 0xb4, 0x52, 0x1d, 0x9c, 0xd5, 0x44, 0x95,\n+\t0xc8, 0xd0, 0x66, 0x8a, 0xbd, 0xf6, 0xd1, 0xff,\n+\t0xeb, 0x82, 0x68, 0x58, 0x7b, 0xec, 0x0e, 0x92,\n+\t0x0e, 0x48, 0xd6, 0xff, 0x8d, 0xac, 0xc1, 0x41,\n+\t0x84, 0x9e, 0x56, 0x54, 0xf9, 0xb5, 0x1c, 0xb0,\n+\t0x9f, 0xde, 0xfe, 0x14, 0x42, 0x0d, 0x22, 0x12,\n+\t0xf2, 0x7d, 0x7b, 0xc3, 0x2e, 0x72, 0x27, 0x76,\n+\t0x12, 0xdf, 0x57, 0x2f, 0x97, 0x82, 0x9b, 0xcf,\n+\t0x75, 0x1a, 0x4a, 0x0c, 0xad, 0x29, 0x56, 0x4c,\n+\t0x74, 0xaf, 0x95, 0x03, 0xff, 0x9f, 0x9d, 0xc3,\n+\t0x2e, 0x9c, 0x1a, 0x42, 0x75, 0xe1, 0x59, 0xc9,\n+\t0x05, 0x12, 0x6c, 0xea, 0x2b, 0x2f, 0x89, 0xfc,\n+\t0xa4, 0x73, 0xc8, 0xdc, 0xf6, 0xd5, 0x50, 0x19,\n+\t0x22, 0x80, 0xbc, 0x08, 0x48, 0xb4, 0x45, 0x47,\n+\t0x25, 0x01, 0xa9, 0x55, 0x7b, 0x66, 0xbd, 0x84,\n+\t0x0f, 0x16, 0xfa, 0x44, 0x23, 0x51, 0x6f, 0xed,\n+\t0x35, 0x0e, 0x88, 0x4d, 0xda, 0xe8, 0x27, 0x94,\n+\t0xbd, 0x68, 0x46, 0x28, 0x79, 0x8c, 0x03, 0x03,\n+\t0xf0, 0x81, 0xac, 0xbc, 0xc2, 0xdd, 0xa8, 0x98,\n+\t0xdf, 0xe3, 0x1c, 0x1c, 0x4b, 0x43, 0x9e, 0x7b,\n+\t0x26, 0x3c, 0xe9, 0xff, 0x3b, 0xee, 0x35, 0xe6,\n+\t0x2a, 0xcf, 0xdc, 0x17, 0x85, 0x99, 0x9e, 0x88,\n+\t0x5c, 0x38, 0x4c, 0x56, 0x4a, 0x06, 0xeb, 0x28,\n+\t0xf7, 0xb5, 0x97, 0x04, 0xd4, 0x05, 0x85, 0xee,\n+\t0x90, 0xd7, 0xe2, 0x10, 0x8a, 0x86, 0xb2, 0x3f,\n+\t0xbf, 0x3f, 0x6a, 0xe6, 0xeb, 0xc1, 0x42, 0x97,\n+\t0xcb, 0x30, 0x41, 0x44, 0x79, 0x44, 0x7e, 0x1e,\n+\t0x3e, 0x55, 0xe5, 0xc8, 0xd5, 0xec, 0x64, 0x3d,\n+\t0x09, 0x69, 0xea, 0xdb, 0xe5, 0x08, 0x33, 0x00,\n+\t0x79, 0x1b, 0x31, 0xf2, 0x3d, 0xbd, 0x73, 0xe6,\n+\t0x0e, 0xc1, 0xb9, 0x45, 0xbf, 0xa5, 0x52, 0x5a,\n+\t0xcd, 0x71, 0x7a, 0x2e, 0x20, 0x1e, 0xbf, 0xff,\n+\t0x42, 0x0a, 0x6a, 0x1b, 0xa4, 0xad, 0x79, 0x3d,\n+\t0x34, 0x54, 0x73, 0xe2, 0xd6, 0x6f, 0xb0, 0xcc,\n+\t0xc0, 0x8a, 0x56, 0x3d, 0x4d, 0x90, 0x35, 0xe3,\n+\t0x4b, 0xcc, 0x40, 0x40, 0xbc, 0xcf, 0x93, 0xa0,\n+\t0xbd, 0x5c, 0xed, 0x22, 0x57, 0x92, 0x5c, 0x8d,\n+\t0xfb, 0x67, 0x9e, 0xab, 0x40, 0xc9, 0xed, 0x7c,\n+\t0xa1, 0xb6, 0x36, 0xb2, 0xcb, 0xbc, 0xf2, 0x1a,\n+\t0x46, 0x6c, 0x1f, 0xb3, 0xe4, 0xf6, 0x4c, 0x7a,\n+\t0x10, 0x81, 0x16, 0x93, 0x77, 0xa3, 0xa1, 0x07,\n+\t0xec, 0xc8, 0x01, 0x76, 0xf8, 0xe3, 0xe6, 0xae,\n+\t0xaf, 0x90, 0x98, 0x3a, 0xbd, 0x7d, 0x28, 0x57,\n+\t0xb4, 0xc5, 0xfe, 0x13, 0xab, 0x6c, 0x77, 0xc1,\n+\t0xc3, 0x47, 0x1d, 0x34, 0x2f, 0xdd, 0xe1, 0x7b,\n+\t0x8b, 0x65, 0xc4, 0xe3, 0x45, 0xda, 0x6e, 0xba,\n+\t0x37, 0xb1, 0x37, 0xbf, 0x63, 0x1d, 0x39, 0x77,\n+\t0xf0, 0xa8, 0xf8, 0xda, 0x91, 0xd3, 0x27, 0xb9,\n+\t0x29, 0x70, 0xf7, 0xae, 0x11, 0x6d, 0x8a, 0x8f,\n+\t0x2f, 0x3a, 0xe1, 0xb8, 0x9b, 0xb5, 0x2a, 0xa8,\n+\t0x7b, 0x86, 0x49, 0xca, 0x0c, 0x95, 0x17, 0x1e,\n+\t0xaf, 0x9c, 0x52, 0x6b, 0x68, 0xae, 0xe3, 0xc3,\n+\t0xc9, 0x8c, 0x89, 0x4b, 0xf2, 0xfb, 0xb1, 0xae,\n+\t0x2f, 0x80, 0xf9, 0xa3, 0xf4, 0x10, 0x09, 0x36,\n+\t0x81, 0x27, 0x06, 0x6d, 0xe9, 0x79, 0x8e, 0xa4,\n+\t0x8e, 0x12, 0xfa, 0x03, 0x8e, 0x69, 0x4c, 0x7e,\n+\t0xc5, 0x10, 0xd5, 0x00, 0x64, 0x87, 0xf8, 0x10,\n+\t0x8a, 0x8e, 0x96, 0x9e, 0xc8, 0xac, 0x42, 0x75,\n+\t0x97, 0x6d, 0x62, 0x3f, 0xa3, 0x29, 0x11, 0xd2,\n+\t0x73, 0xd3, 0x95, 0xef, 0xb4, 0x64, 0xa4, 0x37,\n+\t0x09, 0x15, 0x42, 0x7f, 0xc4, 0x46, 0x8b, 0x80,\n+\t0xa8, 0xd9, 0x2a, 0xfc, 0x38, 0x8f, 0xf9, 0xc1,\n+\t0xc5, 0x95, 0xad, 0x62, 0xc9, 0x6c, 0x60, 0x0b,\n+\t0x30, 0x04, 0x8c, 0x88, 0xb5, 0x0b, 0x73, 0x23,\n+\t0xa4, 0xe0, 0xb7, 0x6e, 0x4c, 0x78, 0xe5, 0x0a,\n+\t0xfb, 0xe1, 0xc4, 0xeb, 0x1a, 0xb4, 0xd8, 0x3c,\n+\t0x06, 0xb0, 0x00, 0x23, 0x86, 0xb0, 0xb4, 0x9d,\n+\t0x33, 0xe4, 0x21, 0xca, 0xf2, 0xad, 0x14, 0x07,\n+\t0x82, 0x25, 0xde, 0x85, 0xe4, 0x58, 0x56, 0x93,\n+\t0x09, 0x3a, 0xeb, 0xde, 0x46, 0x77, 0x76, 0xa2,\n+\t0x35, 0x39, 0xd0, 0xf6, 0x10, 0x81, 0x73, 0x3f,\n+\t0x22, 0x3b, 0xeb, 0xca, 0x00, 0x19, 0x38, 0x89,\n+\t0x26, 0x29, 0x7d, 0x6f, 0x70, 0xa6, 0xbb, 0x52,\n+\t0x58, 0xb1, 0x0a, 0x85, 0xe9, 0x0b, 0x74, 0x2f,\n+\t0x08, 0xe8, 0xa4, 0x4d, 0xa1, 0xcf, 0xf2, 0x75,\n+\t0xed, 0x05, 0xae, 0x7f, 0x10, 0xb1, 0x71, 0x26,\n+\t0xc5, 0xc7, 0xdc, 0xb0, 0x2d, 0x26, 0xf1, 0xb4\n+};\n+\n+/** AES-128-ECB test vector */\n+static const struct blockcipher_test_data aes_test_data_15 = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,\n+\t\t\t 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c\n+\t\t},\n+\t\t.len = 16\n+\t},\n+\t.iv = {\n+\t       .data = { 0 },\n+\t       .len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_aes128ecb,\n+\t\t.len = 64\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext_aes128ecb,\n+\t\t.len = 64\n+\t}\n+};\n+\n+/** AES-192-ECB test vector */\n+static const struct blockcipher_test_data aes_test_data_16 = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52,\n+\t\t\t 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5,\n+\t\t\t 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b\n+\t\t},\n+\t\t.len = 24\n+\t},\n+\t.iv = {\n+\t       .data = { 0 },\n+\t       .len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_aes192ecb,\n+\t\t.len = 64\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext_aes192ecb,\n+\t\t.len = 64\n+\t}\n+};\n+\n+/** AES-256-ECB test vector */\n+static const struct blockcipher_test_data aes_test_data_17 = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe,\n+\t\t\t 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81,\n+\t\t\t 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7,\n+\t\t\t 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4\n+\t\t},\n+\t\t.len = 32\n+\t},\n+\t.iv = {\n+\t       .data = { 0 },\n+\t       .len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_aes256ecb,\n+\t\t.len = 64\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext_aes256ecb,\n+\t\t.len = 64\n+\t}\n+};\n+\n+/** AES-128-ECB 128 byte test vector */\n+static const struct blockcipher_test_data aes_test_data_18 = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,\n+\t\t\t 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c\n+\t\t},\n+\t\t.len = 16\n+\t},\n+\t.iv = {\n+\t       .data = { 0 },\n+\t       .len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_aes128ecb_128bytes,\n+\t\t.len = 128\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext_aes128ecb_128bytes,\n+\t\t.len = 128\n+\t}\n+};\n+\n+/** AES-192-ECB 192 bytes test vector */\n+static const struct blockcipher_test_data aes_test_data_19 = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52,\n+\t\t\t 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5,\n+\t\t\t 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b\n+\t\t},\n+\t\t.len = 24\n+\t},\n+\t.iv = {\n+\t       .data = { 0 },\n+\t       .len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_aes192ecb_192bytes,\n+\t\t.len = 64\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext_aes192ecb_192bytes,\n+\t\t.len = 64\n+\t}\n+};\n+\n+/** AES-256-ECB 256 byte test vector */\n+static const struct blockcipher_test_data aes_test_data_20 = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe,\n+\t\t\t 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81,\n+\t\t\t 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7,\n+\t\t\t 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4\n+\t\t},\n+\t\t.len = 32\n+\t},\n+\t.iv = {\n+\t       .data = { 0 },\n+\t       .len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_aes256ecb_256bytes,\n+\t\t.len = 256\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext_aes256ecb_256bytes,\n+\t\t.len = 256\n+\t}\n+};\n+\n+/** AES-128-ECB 1008 byte test vector */\n+static const struct blockcipher_test_data aes_test_data_21 = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,\n+\t\t\t 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c\n+\t\t},\n+\t\t.len = 16\n+\t},\n+\t.iv = {\n+\t       .data = { 0 },\n+\t       .len = 0\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_aes128ecb_1008bytes,\n+\t\t.len = 1008\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext_aes128ecb_1008bytes,\n+\t\t.len = 1008\n+\t}\n+};\n+\n /* NULL cipher NULL auth 8-byte multiple test vector */\n static const struct blockcipher_test_data null_test_data_chain_x8_multiple = {\n \t.crypto_algo = RTE_CRYPTO_CIPHER_NULL,\n@@ -2156,6 +2816,76 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {\n \t\t.test_data = &null_test_data_chain_x1_multiple,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n \t},\n+\t{\n+\t\t.test_descr = \"AES-128-ECB Encryption\",\n+\t\t.test_data = &aes_test_data_15,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-128-ECB Decryption\",\n+\t\t.test_data = &aes_test_data_15,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-192-ECB Encryption\",\n+\t\t.test_data = &aes_test_data_16,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-192-ECB Decryption\",\n+\t\t.test_data = &aes_test_data_16,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-256-ECB Encryption\",\n+\t\t.test_data = &aes_test_data_17,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-256-ECB Decryption\",\n+\t\t.test_data = &aes_test_data_17,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-128-ECB Encryption (128-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_18,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-128-ECB Decryption (128-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_18,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-192-ECB Encryption (192-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_19,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-192-ECB Decryption (192-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_19,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-256-ECB Encryption (256-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_20,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-256-ECB Decryption (192-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_20,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-128-ECB Encryption (1008-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_21,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t},\n+\t{\n+\t\t.test_descr = \"AES-128-ECB Decryption (1008-byte plaintext)\",\n+\t\t.test_data = &aes_test_data_21,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t},\n };\n \n static const struct blockcipher_test_case aes_docsis_test_cases[] = {\ndiff --git a/doc/guides/cryptodevs/aesni_mb.rst b/doc/guides/cryptodevs/aesni_mb.rst\nindex 15388d20a..69d69ff31 100644\n--- a/doc/guides/cryptodevs/aesni_mb.rst\n+++ b/doc/guides/cryptodevs/aesni_mb.rst\n@@ -32,6 +32,9 @@ Cipher algorithms:\n * RTE_CRYPTO_CIPHER_DES_CBC\n * RTE_CRYPTO_CIPHER_3DES_CBC\n * RTE_CRYPTO_CIPHER_DES_DOCSISBPI\n+* RTE_CRYPTO_CIPHER_AES128_ECB\n+* RTE_CRYPTO_CIPHER_AES192_ECB\n+* RTE_CRYPTO_CIPHER_AES256_ECB\n \n Hash algorithms:\n \ndiff --git a/doc/guides/cryptodevs/features/aesni_mb.ini b/doc/guides/cryptodevs/features/aesni_mb.ini\nindex 38d255aff..126b3a496 100644\n--- a/doc/guides/cryptodevs/features/aesni_mb.ini\n+++ b/doc/guides/cryptodevs/features/aesni_mb.ini\n@@ -30,6 +30,9 @@ AES DOCSIS BPI = Y\n DES CBC        = Y\n 3DES CBC       = Y\n DES DOCSIS BPI = Y\n+AES ECB (128)  = Y\n+AES ECB (192)  = Y\n+AES ECB (256)  = Y\n \n ;\n ; Supported authentication algorithms of the 'aesni_mb' crypto driver.\ndiff --git a/doc/guides/rel_notes/release_20_11.rst b/doc/guides/rel_notes/release_20_11.rst\nindex df227a177..a88ad110f 100644\n--- a/doc/guides/rel_notes/release_20_11.rst\n+++ b/doc/guides/rel_notes/release_20_11.rst\n@@ -55,6 +55,10 @@ New Features\n      Also, make sure to start the actual text at the margin.\n      =======================================================\n \n+* **Added support for AES-ECB in aesni_mb PMD.**\n+\n+  * Added support for AES-ECB 128, 192 and 256 in aesni_mb PMD.\n+\n \n Removed Items\n -------------\ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c\nindex 1bddbcf74..e49428358 100644\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c\n@@ -429,6 +429,12 @@ aesni_mb_set_session_cipher_parameters(const MB_MGR *mb_mgr,\n \t\tsess->cipher.mode = DES3;\n \t\tis_3DES = 1;\n \t\tbreak;\n+#if IMB_VERSION(0, 53, 0) <= IMB_VERSION_NUM\n+\tcase RTE_CRYPTO_CIPHER_AES_ECB:\n+\t\tsess->cipher.mode = ECB;\n+\t\tis_aes = 1;\n+\t\tbreak;\n+#endif\n \tdefault:\n \t\tAESNI_MB_LOG(ERR, \"Unsupported cipher mode parameter\");\n \t\treturn -ENOTSUP;\ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c\nindex 2362f0c3c..ccec4ebd0 100644\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c\n@@ -497,6 +497,24 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+#if IMB_VERSION(0, 53, 0) <= IMB_VERSION_NUM\n+\t{\t/* AES ECB */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+#endif\n \tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n };\n \n",
    "prefixes": []
}