get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/98356/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 98356,
    "url": "https://patches.dpdk.org/api/patches/98356/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210908125127.3566886-4-g.singh@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210908125127.3566886-4-g.singh@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210908125127.3566886-4-g.singh@nxp.com",
    "date": "2021-09-08T12:51:25",
    "name": "[v4,3/5] test/crypto: add pdcp security short MAC-I support",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "9fffa683ce9a7f411f0fe6eda7cbb1050a27d2e9",
    "submitter": {
        "id": 1068,
        "url": "https://patches.dpdk.org/api/people/1068/?format=api",
        "name": "Gagandeep Singh",
        "email": "g.singh@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210908125127.3566886-4-g.singh@nxp.com/mbox/",
    "series": [
        {
            "id": 18765,
            "url": "https://patches.dpdk.org/api/series/18765/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18765",
            "date": "2021-09-08T12:51:22",
            "name": "support of MAC-I",
            "version": 4,
            "mbox": "https://patches.dpdk.org/series/18765/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/98356/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/98356/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 89750A0547;\n\tWed,  8 Sep 2021 14:52:06 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 18AAE4121E;\n\tWed,  8 Sep 2021 14:51:57 +0200 (CEST)",
            "from EUR04-VI1-obe.outbound.protection.outlook.com\n (mail-eopbgr80075.outbound.protection.outlook.com [40.107.8.75])\n by mails.dpdk.org (Postfix) with ESMTP id 510FE411A2\n for <dev@dpdk.org>; Wed,  8 Sep 2021 14:51:55 +0200 (CEST)",
            "from VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10)\n by VI1PR04MB3024.eurprd04.prod.outlook.com (2603:10a6:802:d::21) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.24; Wed, 8 Sep\n 2021 12:51:53 +0000",
            "from VI1PR04MB6960.eurprd04.prod.outlook.com\n ([fe80::d496:fcce:f667:7aa7]) by VI1PR04MB6960.eurprd04.prod.outlook.com\n ([fe80::d496:fcce:f667:7aa7%8]) with mapi id 15.20.4500.015; Wed, 8 Sep 2021\n 12:51:53 +0000",
            "from lsv03457.swis.in-blr01.nxp.com (14.142.151.118) by\n SG2PR03CA0144.apcprd03.prod.outlook.com (2603:1096:4:c8::17) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4500.14 via Frontend Transport; Wed, 8 Sep 2021 12:51:51 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=awyxb/euf2KMkwHh+6H2W+CYw3LgX7qq3kHLwVSNtW0KtY/qyO82tV/6lH+eg1orPODlECPzlrSg7cb8CdtEvif/cDmv/HaZsxwwJJCB2gkh0/Gb6ghXWFWGKyd9oliQ3U5tk+/hj7S9DM+2j20wKjahticxTFMnsY2PR0dPVnZeFwNjHVZ7F6g/vUmoxsoYkUkBARy/L8pBFpJH2XNOoL+s7smDKlbtRlowWzUQejXS9HXw+oOO2Jn45hNxw79Frd+QU2Lc+wDdlGS1aBakKRChX2mOEe2l58neB588yhVck4L49pjWw66vBnJzzaiSVp3w1rPerYuh4Fczt+Dzdg==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n bh=ov+ZI7Rea0+sTinuL2DIdxiX59moI1ezRA7y9Esdqcw=;\n b=kockzY6Oex+kun0l0tPLJgmxS4LCpTnqKpCeBEpT9eH7B3x1JqBvJBC87dktkmbDf05mVGufKkMRpRRYB9f6fH6vZHm7bKg9ogn3g5pqNd9H7VNSLgX0b73M3RGE1bXD+7sLNDAbrMFTmAgrcuPUP2BpeTcj+HlBFYJTU+ojh5I82IwkbkJKc6Tqxql6NC43Oms/jcBB8yYL/M1y0QydQVfJCEc9kfE/vn6XD1EY5HyPFAxJYl+Lq7IwJEw6Zb+0sQ7sEcglvKaFi/m3CwFnr51xKRfdXrgRWsmApBt//vGRAvWpyP7IidFINGOS+W1+Avtvvi4e40kCWQI5ARlqeQ==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=ov+ZI7Rea0+sTinuL2DIdxiX59moI1ezRA7y9Esdqcw=;\n b=cV064MzddBqeRUQoxuzOMW9Yc/30klqdFPhRNdk3IV8bpRqyqK7bnARnwa5EGvR7Ho06xNt/aybIf57uo2Ookeb+hEzippYFVl0fi1qwmBM5EgLiea+XuuznwdkFFI+zGdW3nL3Q1BvvWIn84bvY52htqmhOyToz8VCK167rLPw=",
        "Authentication-Results": "marvell.com; dkim=none (message not signed)\n header.d=none;marvell.com; dmarc=none action=none header.from=nxp.com;",
        "From": "Gagandeep Singh <g.singh@nxp.com>",
        "To": "gakhil@marvell.com,\n\tdev@dpdk.org",
        "Cc": "thomas@monjalon.net,\n\tGagandeep Singh <g.singh@nxp.com>",
        "Date": "Wed,  8 Sep 2021 18:21:25 +0530",
        "Message-Id": "<20210908125127.3566886-4-g.singh@nxp.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20210908125127.3566886-1-g.singh@nxp.com>",
        "References": "<20210908120115.3548009-2-g.singh@nxp.com>\n <20210908125127.3566886-1-g.singh@nxp.com>",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR03CA0144.apcprd03.prod.outlook.com\n (2603:1096:4:c8::17) To VI1PR04MB6960.eurprd04.prod.outlook.com\n (2603:10a6:803:12d::10)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "24daf4ca-43d8-4956-c96b-08d972c76eb0",
        "X-MS-TrafficTypeDiagnostic": "VI1PR04MB3024:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <VI1PR04MB3024B185644EB0A33C50D456E1D49@VI1PR04MB3024.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:321;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:VI1PR04MB6960.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(39860400002)(376002)(396003)(346002)(366004)(136003)(38350700002)(5660300002)(8676002)(38100700002)(55236004)(66556008)(66946007)(186003)(478600001)(52116002)(7696005)(1076003)(26005)(316002)(66476007)(8936002)(1006002)(6666004)(36756003)(86362001)(2906002)(4326008)(6486002)(956004)(15650500001)(83380400001)(2616005)(110426009);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 24daf4ca-43d8-4956-c96b-08d972c76eb0",
        "X-MS-Exchange-CrossTenant-AuthSource": "VI1PR04MB6960.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "08 Sep 2021 12:51:53.4766 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n Jz1s0q1LInGlyJU6dpais9o5cTNbf7YfyaIXtaiHV8Guhg6GoQpRzYDIBMz7E1p0",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "VI1PR04MB3024",
        "Subject": "[dpdk-dev] [PATCH v4 3/5] test/crypto: add pdcp security short\n MAC-I support",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch add support to test the pdcp short mac\npackets support in crypto.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\n---\n app/test/test_cryptodev.c                     |  48 ++++++++\n ...est_cryptodev_security_pdcp_test_vectors.h | 105 +++++++++++++++++-\n 2 files changed, 152 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex 9e823db1e6..16d770a17f 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -8767,6 +8767,50 @@ test_PDCP_SDAP_PROTO_encap_all(void)\n \treturn (all_err == TEST_SUCCESS) ? TEST_SUCCESS : TEST_FAILED;\n }\n \n+static int\n+test_PDCP_PROTO_short_mac(void)\n+{\n+\tint i = 0, size = 0;\n+\tint err, all_err = TEST_SUCCESS;\n+\tconst struct pdcp_short_mac_test *cur_test;\n+\n+\tsize = RTE_DIM(list_pdcp_smac_tests);\n+\n+\tfor (i = 0; i < size; i++) {\n+\t\tcur_test = &list_pdcp_smac_tests[i];\n+\t\terr = test_pdcp_proto(\n+\t\t\ti, 0, RTE_CRYPTO_CIPHER_OP_ENCRYPT,\n+\t\t\tRTE_CRYPTO_AUTH_OP_GENERATE, cur_test->data_in,\n+\t\t\tcur_test->in_len, cur_test->data_out,\n+\t\t\tcur_test->in_len + ((cur_test->auth_key) ? 4 : 0),\n+\t\t\tRTE_CRYPTO_CIPHER_NULL, NULL,\n+\t\t\t0, cur_test->param.auth_alg,\n+\t\t\tcur_test->auth_key, cur_test->param.auth_key_len,\n+\t\t\t0, cur_test->param.domain, 0, 0,\n+\t\t\t0, 0, 0);\n+\t\tif (err) {\n+\t\t\tprintf(\"\\t%d) %s: Short MAC test failed\\n\",\n+\t\t\t\t\tcur_test->test_idx,\n+\t\t\t\t\tcur_test->param.name);\n+\t\t\terr = TEST_FAILED;\n+\t\t} else {\n+\t\t\tprintf(\"\\t%d) %s: Short MAC test PASS\\n\",\n+\t\t\t\t\tcur_test->test_idx,\n+\t\t\t\t\tcur_test->param.name);\n+\t\t\trte_hexdump(stdout, \"MAC I\",\n+\t\t\t\t    cur_test->data_out + cur_test->in_len + 2,\n+\t\t\t\t    2);\n+\t\t\terr = TEST_SUCCESS;\n+\t\t}\n+\t\tall_err += err;\n+\t}\n+\n+\tprintf(\"Success: %d, Failure: %d\\n\", size + all_err, -all_err);\n+\n+\treturn (all_err == TEST_SUCCESS) ? TEST_SUCCESS : TEST_FAILED;\n+\n+}\n+\n static int\n test_PDCP_SDAP_PROTO_decap_all(void)\n {\n@@ -14039,6 +14083,8 @@ static struct unit_test_suite cryptodev_snow3g_testsuite  = {\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\ttest_snow3g_encryption_test_case_5),\n \n+\t\tTEST_CASE_ST(ut_setup, ut_teardown,\n+\t\t\ttest_PDCP_PROTO_short_mac),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\ttest_snow3g_encryption_test_case_1_oop),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n@@ -14279,6 +14325,8 @@ static struct unit_test_suite cryptodev_kasumi_testsuite  = {\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\ttest_kasumi_decryption_test_case_1_oop),\n \n+\t\tTEST_CASE_ST(ut_setup, ut_teardown,\n+\t\t\ttest_PDCP_PROTO_short_mac),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\ttest_kasumi_cipher_auth_test_case_1),\n \ndiff --git a/app/test/test_cryptodev_security_pdcp_test_vectors.h b/app/test/test_cryptodev_security_pdcp_test_vectors.h\nindex 703076479d..81fd6e606b 100644\n--- a/app/test/test_cryptodev_security_pdcp_test_vectors.h\n+++ b/app/test/test_cryptodev_security_pdcp_test_vectors.h\n@@ -1,7 +1,7 @@\n /* SPDX-License-Identifier: BSD-3-Clause\n  *\n  * Copyright (C) 2015-2016 Freescale Semiconductor,Inc.\n- * Copyright 2018-2019 NXP\n+ * Copyright 2018-2021 NXP\n  */\n \n #ifndef SECURITY_PDCP_TEST_VECTOR_H_\n@@ -28,6 +28,109 @@ struct pdcp_test_param {\n \tconst char *name;\n };\n \n+struct pdcp_short_mac_test {\n+\tuint32_t test_idx;\n+\tstruct pdcp_short_mac_test_param {\n+\t\tenum rte_security_pdcp_domain domain;\n+\t\tenum rte_crypto_auth_algorithm auth_alg;\n+\t\tuint8_t auth_key_len;\n+\t\tconst char *name;\n+\t} param;\n+\tconst uint8_t *auth_key;\n+\tconst uint8_t *data_in;\n+\tuint32_t in_len;\n+\tconst uint8_t *data_out;\n+};\n+\n+static const struct pdcp_short_mac_test list_pdcp_smac_tests[] = {\n+\t{\n+\t\t.test_idx = 1,\n+\t\t.param = {.name = \"PDCP-SMAC SNOW3G UIA2\",\n+\t\t\t.auth_alg = RTE_CRYPTO_AUTH_SNOW3G_UIA2,\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC,\n+\t\t\t.auth_key_len = 16,\n+\t\t},\n+\t\t.auth_key = (uint8_t[]){ 0x2b, 0xd6, 0x45, 0x9f, 0x82, 0xc5,\n+\t\t\t\t\t 0xb3, 0x00, 0x95, 0x2c, 0x49, 0x10,\n+\t\t\t\t\t 0x48, 0x81, 0xff, 0x48 },\n+\t\t.data_in = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39,\n+\t\t\t\t\t0x38 },\n+\t\t.in_len = 7,\n+\t\t.data_out = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39,\n+\t\t\t\t\t 0x38, 0x56, 0xd2, 0x09, 0xae },\n+\t},\n+\n+\t{\n+\t\t.test_idx = 2,\n+\t\t.param = {.name = \"PDCP-SMAC AES CMAC 1\",\n+\t\t\t.auth_alg = RTE_CRYPTO_AUTH_AES_CMAC,\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC,\n+\t\t\t.auth_key_len = 16,\n+\t\t},\n+\t\t.auth_key = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n+\t\t\t\t\t 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n+\t\t\t\t\t 0x00, 0x00, 0x00, 0x00 },\n+\t\t.data_in = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n+\t\t\t\t\t0x00 },\n+\t\t.in_len = 7,\n+\t\t.data_out = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n+\t\t\t\t\t 0x00, 0x13, 0xf8, 0x4b, 0xea },\n+\t},\n+\n+\t{\n+\t\t.test_idx = 3,\n+\t\t.param = {.name = \"PDCP-SMAC AES CMAC 2\",\n+\t\t\t.auth_alg = RTE_CRYPTO_AUTH_AES_CMAC,\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC,\n+\t\t\t.auth_key_len = 16,\n+\t\t},\n+\t\t.auth_key = (uint8_t[]){ 0x16, 0xc1, 0x98, 0x14,  0x9a, 0x2c,\n+\t\t\t\t\t 0xf4, 0x12, 0x4f, 0xd4, 0x14, 0xec,\n+\t\t\t\t\t 0x72, 0x43, 0x29, 0x04 },\n+\t\t.data_in = (uint8_t[]){ 0x00, 0xc0, 0x00, 0x00, 0x00, 0x05,\n+\t\t\t\t\t0x09, 0xe4 },\n+\t\t.in_len = 8,\n+\t\t.data_out = (uint8_t[]){ 0x00, 0xc0, 0x00, 0x00, 0x00, 0x05,\n+\t\t\t\t\t 0x09, 0xe4, 0xdd, 0xff, 0xde, 0xa9 },\n+\t},\n+\n+\t{\n+\t\t.test_idx = 4,\n+\t\t.param = {.name = \"PDCP-SMAC AES CMAC 3\",\n+\t\t\t.auth_alg = RTE_CRYPTO_AUTH_AES_CMAC,\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC,\n+\t\t\t.auth_key_len = 16,\n+\t\t},\n+\t\t.auth_key = (uint8_t[]){ 0xD3, 0xC5, 0xD5, 0x92, 0x32, 0x7F,\n+\t\t\t\t\t 0xB1, 0x1C, 0x40, 0x35, 0xC6, 0x68,\n+\t\t\t\t\t 0x0A, 0xF8, 0xC6, 0xD3 },\n+\t\t.data_in = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n+\t\t\t\t\t0x00 },\n+\t\t.in_len = 7,\n+\t\t.data_out = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n+\t\t\t\t\t 0x00, 0x23, 0xea, 0x95, 0xb0 },\n+\t},\n+\n+\t{\n+\t\t.test_idx = 5,\n+\t\t.param = {.name = \"PDCP-SMAC NULL\",\n+\t\t\t.auth_alg = RTE_CRYPTO_AUTH_NULL,\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC,\n+\t\t\t.auth_key_len = 16,\n+\t\t},\n+\t\t.auth_key = (uint8_t[]){ 0x2B, 0xD6, 0x45, 0x9F, 0x82, 0xC5,\n+\t\t\t\t\t 0xB3, 0x00, 0x95, 0x2C, 0x49, 0x10,\n+\t\t\t\t\t 0x48, 0x81, 0xFF, 0x48\n+\t\t},\n+\t\t.data_in = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39,\n+\t\t\t\t\t0x38 },\n+\t\t.in_len = 7,\n+\t\t.data_out = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39,\n+\t\t\t\t\t 0x38, 0x00, 0x00, 0x00, 0x00 },\n+\t},\n+\n+};\n+\n static struct pdcp_test_param pdcp_test_params[] = {\n \t{\n \t .name =\n",
    "prefixes": [
        "v4",
        "3/5"
    ]
}