diff --git a/testsuite/gcm-test.c b/testsuite/gcm-test.c
index 45abde88e1cbc59fc878412164e26fdcdf41d430..1c94682684953c82b9fa8fa42d3088a57c166112 100644
--- a/testsuite/gcm-test.c
+++ b/testsuite/gcm-test.c
@@ -2,6 +2,64 @@
 #include "aes.h"
 #include "gcm.h"
 
+static void
+test_gcm_aes(unsigned key_length,
+	     const uint8_t *key,
+	     unsigned auth_length,
+	     const uint8_t *authtext,
+	     unsigned length,
+	     const uint8_t *cleartext,
+	     const uint8_t *ciphertext,
+	     unsigned iv_length,
+	     const uint8_t *iv,
+	     const uint8_t *digest)
+{
+  struct gcm_aes_ctx ctx;
+
+  uint8_t *data = xalloc(length);
+  uint8_t buffer[GCM_BLOCK_SIZE];
+
+  /* encryption */
+  memset(buffer, 0, sizeof(buffer));
+  gcm_aes_set_key(&ctx, key_length, key);
+
+  gcm_aes_set_iv(&ctx, iv_length, iv);
+
+  if (auth_length)
+    gcm_aes_auth(&ctx, auth_length, authtext);
+    
+  if (length)
+    gcm_aes_encrypt(&ctx, length, data, cleartext);
+
+  gcm_aes_digest(&ctx, GCM_BLOCK_SIZE, buffer);
+
+  if (!MEMEQ(length, data, ciphertext))
+    FAIL();
+
+  if (!MEMEQ(GCM_BLOCK_SIZE, buffer, digest))
+    FAIL();
+
+  /* decryption */
+  memset(buffer, 0, sizeof(buffer));
+  gcm_aes_set_iv(&ctx, iv_length, iv);
+
+  if (auth_length)
+    gcm_aes_auth(&ctx, auth_length, authtext);
+    
+  if (length)
+    gcm_aes_decrypt(&ctx, length, data, data);
+
+  gcm_aes_digest(&ctx, GCM_BLOCK_SIZE, buffer);
+
+  if (!MEMEQ(length, data, cleartext))
+    FAIL();
+
+  if (!MEMEQ(GCM_BLOCK_SIZE, buffer, digest))
+    FAIL();
+
+  free(data);
+}
+
 int
 test_main(void)
 {
@@ -11,90 +69,84 @@ test_main(void)
    */
 
   /* Test case 1 */
-  test_cipher_gcm(&nettle_aes128,
-		  /* key */HL("00000000000000000000000000000000"),
-		  /* auth data */ HL(""),
-		  /* plaintext */HL(""),
-		  /* ciphertext*/H(""),
-		  /* IV */HL("000000000000000000000000"),
-		  /* tag */H("58e2fccefa7e3061367f1d57a4e7455a"));
+  test_gcm_aes(/* key */HL("00000000000000000000000000000000"),
+	       /* auth data */ HL(""),
+	       /* plaintext */HL(""),
+	       /* ciphertext*/H(""),
+	       /* IV */HL("000000000000000000000000"),
+	       /* tag */H("58e2fccefa7e3061367f1d57a4e7455a"));
 
   /* Test case 2 */
-  test_cipher_gcm(&nettle_aes128,
-		  HL("00000000000000000000000000000000"),
-		  HL(""),
-		  HL("00000000000000000000000000000000"),
-		  H("0388dace60b6a392f328c2b971b2fe78"),
-		  HL("000000000000000000000000"),
-		  H("ab6e47d42cec13bdf53a67b21257bddf"));
+  test_gcm_aes(HL("00000000000000000000000000000000"),
+	       HL(""),
+	       HL("00000000000000000000000000000000"),
+	       H("0388dace60b6a392f328c2b971b2fe78"),
+	       HL("000000000000000000000000"),
+	       H("ab6e47d42cec13bdf53a67b21257bddf"));
 
   /* Test case 3 */
-  test_cipher_gcm(&nettle_aes128,
-		  HL("feffe9928665731c6d6a8f9467308308"),
-		  HL(""),
-		  HL("d9313225f88406e5a55909c5aff5269a"
-		     "86a7a9531534f7da2e4c303d8a318a72"
-		     "1c3c0c95956809532fcf0e2449a6b525"
-		     "b16aedf5aa0de657ba637b391aafd255"),
-		  H("42831ec2217774244b7221b784d0d49c"
-		    "e3aa212f2c02a4e035c17e2329aca12e"
-		    "21d514b25466931c7d8f6a5aac84aa05"
-		    "1ba30b396a0aac973d58e091473f5985"),
-		  HL("cafebabefacedbaddecaf888"),
-		  H("4d5c2af327cd64a62cf35abd2ba6fab4"));
+  test_gcm_aes(HL("feffe9928665731c6d6a8f9467308308"),
+	       HL(""),
+	       HL("d9313225f88406e5a55909c5aff5269a"
+		  "86a7a9531534f7da2e4c303d8a318a72"
+		  "1c3c0c95956809532fcf0e2449a6b525"
+		  "b16aedf5aa0de657ba637b391aafd255"),
+	       H("42831ec2217774244b7221b784d0d49c"
+		 "e3aa212f2c02a4e035c17e2329aca12e"
+		 "21d514b25466931c7d8f6a5aac84aa05"
+		 "1ba30b396a0aac973d58e091473f5985"),
+	       HL("cafebabefacedbaddecaf888"),
+	       H("4d5c2af327cd64a62cf35abd2ba6fab4"));
 
   /* Test case 4 */
-  test_cipher_gcm(&nettle_aes128,
-		  HL("feffe9928665731c6d6a8f9467308308"),
-		  HL("feedfacedeadbeeffeedfacedeadbeef"
-		     "abaddad2"),
-		  HL("d9313225f88406e5a55909c5aff5269a"
-		     "86a7a9531534f7da2e4c303d8a318a72"
-		     "1c3c0c95956809532fcf0e2449a6b525"
-		     "b16aedf5aa0de657ba637b39"),
-		  H("42831ec2217774244b7221b784d0d49c"
-		    "e3aa212f2c02a4e035c17e2329aca12e"
-		    "21d514b25466931c7d8f6a5aac84aa05"
-		    "1ba30b396a0aac973d58e091"),
-		  HL("cafebabefacedbaddecaf888"),
-		  H("5bc94fbc3221a5db94fae95ae7121a47"));
+  test_gcm_aes(HL("feffe9928665731c6d6a8f9467308308"),
+	       HL("feedfacedeadbeeffeedfacedeadbeef"
+		  "abaddad2"),
+	       HL("d9313225f88406e5a55909c5aff5269a"
+		  "86a7a9531534f7da2e4c303d8a318a72"
+		  "1c3c0c95956809532fcf0e2449a6b525"
+		  "b16aedf5aa0de657ba637b39"),
+	       H("42831ec2217774244b7221b784d0d49c"
+		 "e3aa212f2c02a4e035c17e2329aca12e"
+		 "21d514b25466931c7d8f6a5aac84aa05"
+		 "1ba30b396a0aac973d58e091"),
+	       HL("cafebabefacedbaddecaf888"),
+	       H("5bc94fbc3221a5db94fae95ae7121a47"));
 
 #if 0
   /* Unsupported IV size. */
   /* Test case 5 */
-  test_cipher_gcm(&nettle_aes128,
-		  HL("feffe9928665731c6d6a8f9467308308"),
-		  HL("feedfacedeadbeeffeedfacedeadbeef"
-		     "abaddad2"),
-		  HL("d9313225f88406e5a55909c5aff5269a"
-		     "86a7a9531534f7da2e4c303d8a318a72"
-		     "1c3c0c95956809532fcf0e2449a6b525"
-		     "b16aedf5aa0de657ba637b39"),
-		  HL("cafebabefacedbad"),
-		  H("61353b4c2806934a777ff51fa22a4755"
-		    "699b2a714fcdc6f83766e5f97b6c7423"
-		    "73806900e49f24b22b097544d4896b42"
-		    "4989b5e1ebac0f07c23f4598"),
-		  H("3612d2e79e3b0785561be14aaca2fccb"));
+  test_gcm_aes(HL("feffe9928665731c6d6a8f9467308308"),
+	       HL("feedfacedeadbeeffeedfacedeadbeef"
+		  "abaddad2"),
+	       HL("d9313225f88406e5a55909c5aff5269a"
+		  "86a7a9531534f7da2e4c303d8a318a72"
+		  "1c3c0c95956809532fcf0e2449a6b525"
+		  "b16aedf5aa0de657ba637b39"),
+	       HL("cafebabefacedbad"),
+	       H("61353b4c2806934a777ff51fa22a4755"
+		 "699b2a714fcdc6f83766e5f97b6c7423"
+		 "73806900e49f24b22b097544d4896b42"
+		 "4989b5e1ebac0f07c23f4598"),
+	       H("3612d2e79e3b0785561be14aaca2fccb"));
 
   /* Test case 6 */
-  test_cipher_gcm(&nettle_aes128,
-		  HL("feffe9928665731c6d6a8f9467308308"),
-		  HL("feedfacedeadbeeffeedfacedeadbeef"
-		     "abaddad2"),
-                  HL("d9313225f88406e5a55909c5aff5269a"
-		     "86a7a9531534f7da2e4c303d8a318a72"
-		     "1c3c0c95956809532fcf0e2449a6b525"
-		     "b16aedf5aa0de657ba637b39"),
-		  H("8ce24998625615b603a033aca13fb894"
-		    "be9112a5c3a211a8ba262a3cca7e2ca7"
-		    "01e4a9a4fba43c90ccdcb281d48c7c6f"
-		    "d62875d2aca417034c34aee5"),
-		  HL("9313225df88406e555909c5aff5269aa"
-		     "6a7a9538534f7da1e4c303d2a318a728"
-		     "c3c0c95156809539fcf0e2429a6b5254"
-		     "16aedbf5a0de6a57a637b39b"),
-		  H("619cc5aefffe0bfa462af43c1699d050"));
+  test_gcm_aes(HL("feffe9928665731c6d6a8f9467308308"),
+	       HL("feedfacedeadbeeffeedfacedeadbeef"
+		  "abaddad2"),
+	       HL("d9313225f88406e5a55909c5aff5269a"
+		  "86a7a9531534f7da2e4c303d8a318a72"
+		  "1c3c0c95956809532fcf0e2449a6b525"
+		  "b16aedf5aa0de657ba637b39"),
+	       H("8ce24998625615b603a033aca13fb894"
+		 "be9112a5c3a211a8ba262a3cca7e2ca7"
+		 "01e4a9a4fba43c90ccdcb281d48c7c6f"
+		 "d62875d2aca417034c34aee5"),
+	       HL("9313225df88406e555909c5aff5269aa"
+		  "6a7a9538534f7da1e4c303d2a318a728"
+		  "c3c0c95156809539fcf0e2429a6b5254"
+		  "16aedbf5a0de6a57a637b39b"),
+	       H("619cc5aefffe0bfa462af43c1699d050"));
   
 
 #endif
diff --git a/testsuite/testutils.c b/testsuite/testutils.c
index 3228cb73484dde5e055968b5b34e6b93997cba69..d7886e1be2ec0e88ecc75f2fad02ffe202e18740 100644
--- a/testsuite/testutils.c
+++ b/testsuite/testutils.c
@@ -296,71 +296,6 @@ test_cipher_ctr(const struct nettle_cipher *cipher,
   free(ctr);
 }
 
-void
-test_cipher_gcm(const struct nettle_cipher *cipher,
-		unsigned key_length,
-		const uint8_t *key,
-		unsigned auth_length,
-		const uint8_t *authtext,
-		unsigned length,
-		const uint8_t *cleartext,
-		const uint8_t *ciphertext,
-		unsigned iv_length,
-		const uint8_t *iv,
-		const uint8_t *digest)
-{
-  struct gcm_ctx gctx;
-  void *cipher_ctx = xalloc(cipher->context_size);
-  uint8_t *data = xalloc(length);
-  uint8_t buffer[GCM_BLOCK_SIZE];
-
-  /* encryption */
-  memset(buffer, 0, sizeof(buffer));
-  cipher->set_encrypt_key(cipher_ctx, key_length, key);
-
-  gcm_set_key(&gctx, cipher_ctx, cipher->encrypt);
-  gcm_set_iv(&gctx, iv_length, iv);
-
-  if (auth_length)
-    gcm_auth(&gctx, auth_length, authtext);
-    
-  if (length)
-    gcm_encrypt(&gctx, cipher_ctx, cipher->encrypt,
-		length, data, cleartext);
-
-  gcm_digest(&gctx, cipher_ctx, cipher->encrypt,
-	     GCM_BLOCK_SIZE, buffer);
-
-  if (!MEMEQ(length, data, ciphertext))
-    FAIL();
-
-  if (!MEMEQ(GCM_BLOCK_SIZE, buffer, digest))
-    FAIL();
-
-  /* decryption */
-  memset(buffer, 0, sizeof(buffer));
-  gcm_set_iv(&gctx, iv_length, iv);
-
-  if (auth_length)
-    gcm_auth(&gctx, auth_length, authtext);
-    
-  if (length)
-    gcm_decrypt(&gctx, cipher_ctx, cipher->encrypt,
-		length, data, data);
-
-  gcm_digest(&gctx, cipher_ctx, cipher->encrypt,
-	     GCM_BLOCK_SIZE, buffer);
-
-  if (!MEMEQ(length, data, cleartext))
-    FAIL();
-
-  if (!MEMEQ(GCM_BLOCK_SIZE, buffer, digest))
-    FAIL();
-
-  free(cipher_ctx);
-  free(data);
-}
-
 void
 test_cipher_stream(const struct nettle_cipher *cipher,
 		   unsigned key_length,
diff --git a/testsuite/testutils.h b/testsuite/testutils.h
index bbfa468dda497f9d01ba895722c04375efca4838..91ec49621cf97d9aeb339928181fbfde4060e3c6 100644
--- a/testsuite/testutils.h
+++ b/testsuite/testutils.h
@@ -105,19 +105,6 @@ test_cipher_ctr(const struct nettle_cipher *cipher,
 		const uint8_t *ciphertext,
 		const uint8_t *iv);
 
-void
-test_cipher_gcm(const struct nettle_cipher *cipher,
-		unsigned key_length,
-		const uint8_t *key,
-		unsigned auth_length,
-		const uint8_t *authtext,
-		unsigned length,
-		const uint8_t *cleartext,
-		const uint8_t *ciphertext,
-		unsigned iv_length,
-		const uint8_t *iv,
-		const uint8_t *digest);
-
 void
 test_cipher_stream(const struct nettle_cipher *cipher,
 		   unsigned key_length,