get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/128846/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 128846,
    "url": "http://patchwork.dpdk.org/api/patches/128846/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/20230620103235.539282-2-arkadiuszx.kusztal@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20230620103235.539282-2-arkadiuszx.kusztal@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20230620103235.539282-2-arkadiuszx.kusztal@intel.com",
    "date": "2023-06-20T10:32:33",
    "name": "[v4,1/3] app/test: remove obsolete test function",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "a795e1127685da6e1ccbf9dd9b9c10d7c6e77d32",
    "submitter": {
        "id": 452,
        "url": "http://patchwork.dpdk.org/api/people/452/?format=api",
        "name": "Arkadiusz Kusztal",
        "email": "arkadiuszx.kusztal@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patchwork.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/20230620103235.539282-2-arkadiuszx.kusztal@intel.com/mbox/",
    "series": [
        {
            "id": 28580,
            "url": "http://patchwork.dpdk.org/api/series/28580/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=28580",
            "date": "2023-06-20T10:32:32",
            "name": "Replace obsolote test cases.",
            "version": 4,
            "mbox": "http://patchwork.dpdk.org/series/28580/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/128846/comments/",
    "check": "success",
    "checks": "http://patchwork.dpdk.org/api/patches/128846/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 8255D42D07;\n\tTue, 20 Jun 2023 12:32:48 +0200 (CEST)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 3B7D442D0B;\n\tTue, 20 Jun 2023 12:32:48 +0200 (CEST)",
            "from mga06.intel.com (mga06b.intel.com [134.134.136.31])\n by mails.dpdk.org (Postfix) with ESMTP id 3D1F542D0B\n for <dev@dpdk.org>; Tue, 20 Jun 2023 12:32:46 +0200 (CEST)",
            "from orsmga005.jf.intel.com ([10.7.209.41])\n by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 20 Jun 2023 03:32:44 -0700",
            "from silpixa00401012.ir.intel.com ([10.243.23.125])\n by orsmga005.jf.intel.com with ESMTP; 20 Jun 2023 03:32:41 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1687257166; x=1718793166;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=0VlnZB9vs1xP+wkKSJGFGxwxV6ThRxnm6UD4PghajYM=;\n b=FYKyr+f+7OOOC5NmCijOrWssChlN7idr/qNu08+ru7wharfUnWc5nxeY\n hMIy1aYadVwHO3vVlzFL55U32vXW6zAmSwLr9mn/ZdBFWNmeShcwF1bO/\n wKf6veQG6WW5S69CWyRglcNqok2r1Tw+ai9JHU/DIt0YG5qoyG0ikie89\n 48aPHFsbSDBbR7+qlz2DrZPof5ksJLa1Nf95QJPTVgF+5kNxPLNhAjhLG\n EwOwXxVatsiZqQn+rGvxC13PSSFBBx+DJpyDXa6QWuK66VpOnbY4SyGjH\n z4wrrfj8jWpsgcGqMhFckhOklNGj6hjHwXV6NloYKj1JRAXlVgcaDiU78 w==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6600,9927,10746\"; a=\"423489039\"",
            "E=Sophos;i=\"6.00,256,1681196400\"; d=\"scan'208\";a=\"423489039\"",
            "E=McAfee;i=\"6600,9927,10746\"; a=\"888204783\"",
            "E=Sophos;i=\"6.00,256,1681196400\"; d=\"scan'208\";a=\"888204783\""
        ],
        "X-ExtLoop1": "1",
        "From": "Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "gakhil@marvell.com, kai.ji@intel.com, ciara.power@intel.com,\n Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>",
        "Subject": "[PATCH v4 1/3] app/test: remove obsolete test function",
        "Date": "Tue, 20 Jun 2023 10:32:33 +0000",
        "Message-Id": "<20230620103235.539282-2-arkadiuszx.kusztal@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20230620103235.539282-1-arkadiuszx.kusztal@intel.com>",
        "References": "<20230620103235.539282-1-arkadiuszx.kusztal@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Removed function `one by one` as it was not enough\nscalable and robust.\n\nSigned-off-by: Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>\n---\n app/test/test_cryptodev_asym.c             | 418 ----------\n app/test/test_cryptodev_mod_test_vectors.h | 925 ---------------------\n app/test/test_cryptodev_rsa_test_vectors.h | 224 -----\n 3 files changed, 1567 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c\nindex 15a1f3d638..537973387e 100644\n--- a/app/test/test_cryptodev_asym.c\n+++ b/app/test/test_cryptodev_asym.c\n@@ -52,17 +52,8 @@ struct crypto_unittest_params {\n union test_case_structure {\n \tstruct modex_test_data modex;\n \tstruct modinv_test_data modinv;\n-\tstruct rsa_test_data_2 rsa_data;\n };\n \n-struct test_cases_array {\n-\tuint32_t size;\n-\tconst void *address[TEST_VECTOR_SIZE];\n-};\n-static struct test_cases_array test_vector = {0, { NULL } };\n-\n-static uint32_t test_index;\n-\n static struct crypto_testsuite_params_asym testsuite_params = { NULL };\n \n static int\n@@ -244,410 +235,6 @@ queue_ops_rsa_enc_dec(void *sess)\n \n \treturn status;\n }\n-static int\n-test_cryptodev_asym_ver(struct rte_crypto_op *op,\n-\t\t\t\tstruct rte_crypto_asym_xform *xform_tc,\n-\t\t\t\tunion test_case_structure *data_tc,\n-\t\t\t\tstruct rte_crypto_op *result_op)\n-{\n-\tint status = TEST_FAILED;\n-\tint ret = 0;\n-\tuint8_t *data_expected = NULL, *data_received = NULL;\n-\tsize_t data_size = 0;\n-\n-\tswitch (data_tc->modex.xform_type) {\n-\tcase RTE_CRYPTO_ASYM_XFORM_MODEX:\n-\t\tdata_expected = data_tc->modex.reminder.data;\n-\t\tdata_received = result_op->asym->modex.result.data;\n-\t\tdata_size = result_op->asym->modex.result.length;\n-\t\tbreak;\n-\tcase RTE_CRYPTO_ASYM_XFORM_MODINV:\n-\t\tdata_expected = data_tc->modinv.inverse.data;\n-\t\tdata_received = result_op->asym->modinv.result.data;\n-\t\tdata_size = result_op->asym->modinv.result.length;\n-\t\tbreak;\n-\tcase RTE_CRYPTO_ASYM_XFORM_RSA:\n-\t\tif (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) {\n-\t\t\tdata_size = xform_tc->rsa.n.length;\n-\t\t\tdata_received = result_op->asym->rsa.cipher.data;\n-\t\t\tdata_expected = data_tc->rsa_data.ct.data;\n-\t\t} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) {\n-\t\t\tdata_size = xform_tc->rsa.n.length;\n-\t\t\tdata_expected = data_tc->rsa_data.pt.data;\n-\t\t\tdata_received = result_op->asym->rsa.message.data;\n-\t\t} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_SIGN) {\n-\t\t\tdata_size = xform_tc->rsa.n.length;\n-\t\t\tdata_expected = data_tc->rsa_data.sign.data;\n-\t\t\tdata_received = result_op->asym->rsa.sign.data;\n-\t\t} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_VERIFY) {\n-\t\t\tdata_size = xform_tc->rsa.n.length;\n-\t\t\tdata_expected = data_tc->rsa_data.pt.data;\n-\t\t\tdata_received = result_op->asym->rsa.cipher.data;\n-\t\t}\n-\t\tbreak;\n-\tcase RTE_CRYPTO_ASYM_XFORM_DH:\n-\tcase RTE_CRYPTO_ASYM_XFORM_DSA:\n-\tcase RTE_CRYPTO_ASYM_XFORM_NONE:\n-\tcase RTE_CRYPTO_ASYM_XFORM_UNSPECIFIED:\n-\tdefault:\n-\t\tbreak;\n-\t}\n-\tret = memcmp(data_expected, data_received, data_size);\n-\tif (!ret && data_size)\n-\t\tstatus = TEST_SUCCESS;\n-\n-\treturn status;\n-}\n-\n-static int\n-test_cryptodev_asym_op(struct crypto_testsuite_params_asym *ts_params,\n-\tunion test_case_structure *data_tc,\n-\tchar *test_msg, int sessionless, enum rte_crypto_asym_op_type type,\n-\tenum rte_crypto_rsa_priv_key_type key_type)\n-{\n-\tstruct rte_crypto_asym_op *asym_op = NULL;\n-\tstruct rte_crypto_op *op = NULL;\n-\tstruct rte_crypto_op *result_op = NULL;\n-\tstruct rte_crypto_asym_xform xform_tc;\n-\tvoid *sess = NULL;\n-\tstruct rte_cryptodev_asym_capability_idx cap_idx;\n-\tconst struct rte_cryptodev_asymmetric_xform_capability *capability;\n-\tuint8_t dev_id = ts_params->valid_devs[0];\n-\tuint8_t input[TEST_DATA_SIZE] = {0};\n-\tuint8_t *result = NULL;\n-\n-\tint ret, status = TEST_SUCCESS;\n-\n-\txform_tc.next = NULL;\n-\txform_tc.xform_type = data_tc->modex.xform_type;\n-\n-\tcap_idx.type = xform_tc.xform_type;\n-\tcapability = rte_cryptodev_asym_capability_get(dev_id, &cap_idx);\n-\n-\tif (capability == NULL) {\n-\t\tRTE_LOG(INFO, USER1,\n-\t\t\t\"Device doesn't support MODEX. Test Skipped\\n\");\n-\t\treturn TEST_SKIPPED;\n-\t}\n-\n-\t/* Generate crypto op data structure */\n-\top = rte_crypto_op_alloc(ts_params->op_mpool,\n-\t\tRTE_CRYPTO_OP_TYPE_ASYMMETRIC);\n-\n-\tif (!op) {\n-\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\"line %u FAILED: %s\",\n-\t\t\t__LINE__, \"Failed to allocate asymmetric crypto \"\n-\t\t\t\"operation struct\");\n-\t\tstatus = TEST_FAILED;\n-\t\tgoto error_exit;\n-\t}\n-\n-\tasym_op = op->asym;\n-\n-\tswitch (xform_tc.xform_type) {\n-\tcase RTE_CRYPTO_ASYM_XFORM_MODEX:\n-\t\tresult = rte_zmalloc(NULL, data_tc->modex.result_len, 0);\n-\t\txform_tc.modex.modulus.data = data_tc->modex.modulus.data;\n-\t\txform_tc.modex.modulus.length = data_tc->modex.modulus.len;\n-\t\txform_tc.modex.exponent.data = data_tc->modex.exponent.data;\n-\t\txform_tc.modex.exponent.length = data_tc->modex.exponent.len;\n-\t\tmemcpy(input, data_tc->modex.base.data,\n-\t\t\tdata_tc->modex.base.len);\n-\t\tasym_op->modex.base.data = input;\n-\t\tasym_op->modex.base.length = data_tc->modex.base.len;\n-\t\tasym_op->modex.result.data = result;\n-\t\tasym_op->modex.result.length = data_tc->modex.result_len;\n-\t\tif (rte_cryptodev_asym_xform_capability_check_modlen(capability,\n-\t\t\t\txform_tc.modex.modulus.length)) {\n-\t\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\t\"line %u \"\n-\t\t\t\t\"FAILED: %s\", __LINE__,\n-\t\t\t\t\"Invalid MODULUS length specified\");\n-\t\t\tstatus = TEST_FAILED;\n-\t\t\tgoto error_exit;\n-\t\t}\n-\t\tbreak;\n-\tcase RTE_CRYPTO_ASYM_XFORM_MODINV:\n-\t\tresult = rte_zmalloc(NULL, data_tc->modinv.result_len, 0);\n-\t\txform_tc.modinv.modulus.data = data_tc->modinv.modulus.data;\n-\t\txform_tc.modinv.modulus.length = data_tc->modinv.modulus.len;\n-\t\tmemcpy(input, data_tc->modinv.base.data,\n-\t\t\tdata_tc->modinv.base.len);\n-\t\tasym_op->modinv.base.data = input;\n-\t\tasym_op->modinv.base.length = data_tc->modinv.base.len;\n-\t\tasym_op->modinv.result.data = result;\n-\t\tasym_op->modinv.result.length = data_tc->modinv.result_len;\n-\t\tif (rte_cryptodev_asym_xform_capability_check_modlen(capability,\n-\t\t\t\txform_tc.modinv.modulus.length)) {\n-\t\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\t\"line %u \"\n-\t\t\t\t\"FAILED: %s\", __LINE__,\n-\t\t\t\t\"Invalid MODULUS length specified\");\n-\t\t\tstatus = TEST_FAILED;\n-\t\t\tgoto error_exit;\n-\t\t}\n-\t\tbreak;\n-\tcase RTE_CRYPTO_ASYM_XFORM_RSA:\n-\t\tresult = rte_zmalloc(NULL, data_tc->rsa_data.n.len, 0);\n-\t\top->asym->rsa.op_type = type;\n-\t\txform_tc.rsa.e.data = data_tc->rsa_data.e.data;\n-\t\txform_tc.rsa.e.length = data_tc->rsa_data.e.len;\n-\t\txform_tc.rsa.n.data = data_tc->rsa_data.n.data;\n-\t\txform_tc.rsa.n.length = data_tc->rsa_data.n.len;\n-\n-\t\tif (key_type == RTE_RSA_KEY_TYPE_EXP) {\n-\t\t\txform_tc.rsa.d.data = data_tc->rsa_data.d.data;\n-\t\t\txform_tc.rsa.d.length = data_tc->rsa_data.d.len;\n-\t\t} else {\n-\t\t\txform_tc.rsa.qt.p.data = data_tc->rsa_data.p.data;\n-\t\t\txform_tc.rsa.qt.p.length = data_tc->rsa_data.p.len;\n-\t\t\txform_tc.rsa.qt.q.data = data_tc->rsa_data.q.data;\n-\t\t\txform_tc.rsa.qt.q.length = data_tc->rsa_data.q.len;\n-\t\t\txform_tc.rsa.qt.dP.data = data_tc->rsa_data.dP.data;\n-\t\t\txform_tc.rsa.qt.dP.length = data_tc->rsa_data.dP.len;\n-\t\t\txform_tc.rsa.qt.dQ.data = data_tc->rsa_data.dQ.data;\n-\t\t\txform_tc.rsa.qt.dQ.length = data_tc->rsa_data.dQ.len;\n-\t\t\txform_tc.rsa.qt.qInv.data = data_tc->rsa_data.qInv.data;\n-\t\t\txform_tc.rsa.qt.qInv.length = data_tc->rsa_data.qInv.len;\n-\t\t}\n-\n-\t\txform_tc.rsa.key_type = key_type;\n-\t\top->asym->rsa.padding.type = data_tc->rsa_data.padding;\n-\n-\t\tif (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) {\n-\t\t\tasym_op->rsa.message.data = data_tc->rsa_data.pt.data;\n-\t\t\tasym_op->rsa.message.length = data_tc->rsa_data.pt.len;\n-\t\t\tasym_op->rsa.cipher.data = result;\n-\t\t\tasym_op->rsa.cipher.length = data_tc->rsa_data.n.len;\n-\t\t} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) {\n-\t\t\tasym_op->rsa.message.data = result;\n-\t\t\tasym_op->rsa.message.length = data_tc->rsa_data.n.len;\n-\t\t\tasym_op->rsa.cipher.data = data_tc->rsa_data.ct.data;\n-\t\t\tasym_op->rsa.cipher.length = data_tc->rsa_data.ct.len;\n-\t\t} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_SIGN) {\n-\t\t\tasym_op->rsa.sign.data = result;\n-\t\t\tasym_op->rsa.sign.length = data_tc->rsa_data.n.len;\n-\t\t\tasym_op->rsa.message.data = data_tc->rsa_data.pt.data;\n-\t\t\tasym_op->rsa.message.length = data_tc->rsa_data.pt.len;\n-\t\t} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_VERIFY) {\n-\t\t\tasym_op->rsa.cipher.data = result;\n-\t\t\tasym_op->rsa.cipher.length = data_tc->rsa_data.n.len;\n-\t\t\tasym_op->rsa.sign.data = data_tc->rsa_data.sign.data;\n-\t\t\tasym_op->rsa.sign.length = data_tc->rsa_data.sign.len;\n-\t\t}\n-\t\tbreak;\n-\tcase RTE_CRYPTO_ASYM_XFORM_DH:\n-\tcase RTE_CRYPTO_ASYM_XFORM_DSA:\n-\tcase RTE_CRYPTO_ASYM_XFORM_NONE:\n-\tcase RTE_CRYPTO_ASYM_XFORM_UNSPECIFIED:\n-\tdefault:\n-\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\t\"line %u \"\n-\t\t\t\t\"FAILED: %s\", __LINE__,\n-\t\t\t\t\"Invalid ASYM algorithm specified\");\n-\t\tstatus = TEST_FAILED;\n-\t\tgoto error_exit;\n-\t}\n-\n-\tif (!sessionless) {\n-\t\tret = rte_cryptodev_asym_session_create(dev_id, &xform_tc,\n-\t\t\t\tts_params->session_mpool, &sess);\n-\t\tif (ret < 0) {\n-\t\t\tstatus = (ret == -ENOTSUP) ? TEST_SKIPPED : TEST_FAILED;\n-\t\t\tif (status == TEST_SKIPPED)\n-\t\t\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"SKIPPED\");\n-\t\t\telse\n-\t\t\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\t\t\t\"line %u \"\n-\t\t\t\t\t\t\"FAILED: %s\", __LINE__,\n-\t\t\t\t\t\t\"Session creation failed\");\n-\t\t\tgoto error_exit;\n-\t\t}\n-\n-\t\trte_crypto_op_attach_asym_session(op, sess);\n-\t} else {\n-\t\tasym_op->xform = &xform_tc;\n-\t\top->sess_type = RTE_CRYPTO_OP_SESSIONLESS;\n-\t}\n-\tRTE_LOG(DEBUG, USER1, \"Process ASYM operation\");\n-\n-\t/* Process crypto operation */\n-\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n-\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\t\"line %u FAILED: %s\",\n-\t\t\t\t__LINE__, \"Error sending packet for operation\");\n-\t\tstatus = TEST_FAILED;\n-\t\tgoto error_exit;\n-\t}\n-\n-\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n-\t\trte_pause();\n-\n-\tif (result_op == NULL) {\n-\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\t\"line %u FAILED: %s\",\n-\t\t\t\t__LINE__, \"Failed to process asym crypto op\");\n-\t\tstatus = TEST_FAILED;\n-\t\tgoto error_exit;\n-\t}\n-\n-\tif (test_cryptodev_asym_ver(op, &xform_tc, data_tc, result_op) != TEST_SUCCESS) {\n-\t\tif (result_op->status == RTE_CRYPTO_OP_STATUS_INVALID_ARGS) {\n-\t\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"SESSIONLESS SKIPPED\");\n-\t\t\tstatus = TEST_SKIPPED;\n-\t\t\tgoto error_exit;\n-\t\t}\n-\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n-\t\t\t\"line %u FAILED: %s\",\n-\t\t\t__LINE__, \"Verification failed \");\n-\t\tstatus = TEST_FAILED;\n-\t\tgoto error_exit;\n-\t}\n-\n-\tif (!sessionless)\n-\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"PASS\");\n-\telse\n-\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"SESSIONLESS PASS\");\n-\n-error_exit:\n-\t\tif (sess != NULL)\n-\t\t\trte_cryptodev_asym_session_free(dev_id, sess);\n-\n-\t\trte_crypto_op_free(op);\n-\n-\t\trte_free(result);\n-\n-\treturn status;\n-}\n-\n-static int\n-test_one_case(const void *test_case, int sessionless)\n-{\n-\tint status = TEST_SUCCESS, i = 0;\n-\tchar test_msg[ASYM_TEST_MSG_LEN + 1];\n-\n-\t/* Map the case to union */\n-\tunion test_case_structure tc;\n-\tmemcpy(&tc, test_case, sizeof(tc));\n-\n-\tif (tc.modex.xform_type == RTE_CRYPTO_ASYM_XFORM_MODEX\n-\t\t\t|| tc.modex.xform_type == RTE_CRYPTO_ASYM_XFORM_MODINV) {\n-\t\tstatus = test_cryptodev_asym_op(&testsuite_params, &tc, test_msg,\n-\t\t\t\tsessionless, 0, 0);\n-\t\tprintf(\"  %u) TestCase %s %s\\n\", test_index++,\n-\t\t\ttc.modex.description, test_msg);\n-\t} else {\n-\t\tfor (i = 0; i < RTE_CRYPTO_ASYM_OP_LIST_END; i++) {\n-\t\t\tif (tc.modex.xform_type == RTE_CRYPTO_ASYM_XFORM_RSA) {\n-\t\t\t\tif (tc.rsa_data.op_type_flags & (1 << i)) {\n-\t\t\t\t\tif (tc.rsa_data.key_exp) {\n-\t\t\t\t\t\tstatus = test_cryptodev_asym_op(\n-\t\t\t\t\t\t\t&testsuite_params, &tc,\n-\t\t\t\t\t\t\ttest_msg, sessionless, i,\n-\t\t\t\t\t\t\tRTE_RSA_KEY_TYPE_EXP);\n-\t\t\t\t\t}\n-\t\t\t\t\tif (status)\n-\t\t\t\t\t\tbreak;\n-\t\t\t\t\tif (tc.rsa_data.key_qt && (i ==\n-\t\t\t\t\t\t\tRTE_CRYPTO_ASYM_OP_DECRYPT ||\n-\t\t\t\t\t\t\ti == RTE_CRYPTO_ASYM_OP_SIGN)) {\n-\t\t\t\t\t\tstatus = test_cryptodev_asym_op(\n-\t\t\t\t\t\t\t&testsuite_params,\n-\t\t\t\t\t\t\t&tc, test_msg, sessionless, i,\n-\t\t\t\t\t\t\tRTE_RSA_KEY_TYPE_QT);\n-\t\t\t\t\t}\n-\t\t\t\t\tif (status)\n-\t\t\t\t\t\tbreak;\n-\t\t\t\t}\n-\t\t\t}\n-\t\t}\n-\t\tprintf(\"  %u) TestCase %s %s\\n\", test_index++,\n-\t\t\ttc.modex.description, test_msg);\n-\t}\n-\n-\treturn status;\n-}\n-\n-static int\n-load_test_vectors(void)\n-{\n-\tuint32_t i = 0, v_size = 0;\n-\t/* Load MODEX vector*/\n-\tv_size = RTE_DIM(modex_test_case);\n-\tfor (i = 0; i < v_size; i++) {\n-\t\tif (test_vector.size >= (TEST_VECTOR_SIZE)) {\n-\t\t\tRTE_LOG(DEBUG, USER1,\n-\t\t\t\t\"TEST_VECTOR_SIZE too small\\n\");\n-\t\t\treturn -1;\n-\t\t}\n-\t\ttest_vector.address[test_vector.size] = &modex_test_case[i];\n-\t\ttest_vector.size++;\n-\t}\n-\t/* Load MODINV vector*/\n-\tv_size = RTE_DIM(modinv_test_case);\n-\tfor (i = 0; i < v_size; i++) {\n-\t\tif (test_vector.size >= (TEST_VECTOR_SIZE)) {\n-\t\t\tRTE_LOG(DEBUG, USER1,\n-\t\t\t\t\"TEST_VECTOR_SIZE too small\\n\");\n-\t\t\treturn -1;\n-\t\t}\n-\t\ttest_vector.address[test_vector.size] = &modinv_test_case[i];\n-\t\ttest_vector.size++;\n-\t}\n-\t/* Load RSA vector*/\n-\tv_size = RTE_DIM(rsa_test_case_list);\n-\tfor (i = 0; i < v_size; i++) {\n-\t\tif (test_vector.size >= (TEST_VECTOR_SIZE)) {\n-\t\t\tRTE_LOG(DEBUG, USER1,\n-\t\t\t\t\"TEST_VECTOR_SIZE too small\\n\");\n-\t\t\treturn -1;\n-\t\t}\n-\t\ttest_vector.address[test_vector.size] = &rsa_test_case_list[i];\n-\t\ttest_vector.size++;\n-\t}\n-\treturn 0;\n-}\n-\n-static int\n-test_one_by_one(void)\n-{\n-\tint status = TEST_SUCCESS;\n-\tstruct crypto_testsuite_params_asym *ts_params = &testsuite_params;\n-\tuint32_t i = 0;\n-\tuint8_t dev_id = ts_params->valid_devs[0];\n-\tstruct rte_cryptodev_info dev_info;\n-\tint sessionless = 0;\n-\n-\trte_cryptodev_info_get(dev_id, &dev_info);\n-\tif ((dev_info.feature_flags &\n-\t\t\tRTE_CRYPTODEV_FF_ASYM_SESSIONLESS)) {\n-\t\tsessionless = 1;\n-\t}\n-\n-\t/* Go through all test cases */\n-\ttest_index = 0;\n-\tfor (i = 0; i < test_vector.size; i++) {\n-\t\tstatus = test_one_case(test_vector.address[i], 0);\n-\t\tif (status == TEST_SUCCESS || status == TEST_SKIPPED)\n-\t\t\tstatus = TEST_SUCCESS;\n-\t\telse\n-\t\t\tstatus = TEST_FAILED;\n-\t}\n-\n-\tif (sessionless) {\n-\t\tfor (i = 0; i < test_vector.size; i++) {\n-\t\t\tstatus = test_one_case(test_vector.address[i], 1);\n-\t\t\tif (status == TEST_SUCCESS || status == TEST_SKIPPED)\n-\t\t\t\tstatus = TEST_SUCCESS;\n-\t\t\telse\n-\t\t\t\tstatus = TEST_FAILED;\n-\t\t}\n-\t}\n-\n-\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n-\treturn status;\n-}\n \n static int\n test_rsa_sign_verify(void)\n@@ -821,9 +408,6 @@ testsuite_setup(void)\n \n \tmemset(ts_params, 0, sizeof(*ts_params));\n \n-\ttest_vector.size = 0;\n-\tload_test_vectors();\n-\n \t/* Device, op pool and session configuration for asymmetric crypto. 8< */\n \tts_params->op_mpool = rte_crypto_op_pool_create(\n \t\t\t\"CRYPTO_ASYM_OP_POOL\",\n@@ -2809,7 +2393,6 @@ static struct unit_test_suite cryptodev_openssl_asym_testsuite  = {\n \t\t\t\ttest_rsa_sign_verify_crt),\n \t\tTEST_CASE_ST(ut_setup_asym, ut_teardown_asym, test_mod_inv),\n \t\tTEST_CASE_ST(ut_setup_asym, ut_teardown_asym, test_mod_exp),\n-\t\tTEST_CASE_ST(ut_setup_asym, ut_teardown_asym, test_one_by_one),\n \t\tTEST_CASES_END() /**< NULL terminate unit test array */\n \t}\n };\n@@ -2819,7 +2402,6 @@ static struct unit_test_suite cryptodev_qat_asym_testsuite  = {\n \t.setup = testsuite_setup,\n \t.teardown = testsuite_teardown,\n \t.unit_test_cases = {\n-\t\tTEST_CASE_ST(ut_setup_asym, ut_teardown_asym, test_one_by_one),\n \t\tTEST_CASES_END() /**< NULL terminate unit test array */\n \t}\n };\ndiff --git a/app/test/test_cryptodev_mod_test_vectors.h b/app/test/test_cryptodev_mod_test_vectors.h\nindex 807ca7a47e..7763377110 100644\n--- a/app/test/test_cryptodev_mod_test_vectors.h\n+++ b/app/test/test_cryptodev_mod_test_vectors.h\n@@ -47,931 +47,6 @@ struct modinv_test_data {\n \tuint16_t result_len;\n };\n \n-static const struct\n-modex_test_data modex_test_case[] = {\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=128, base=20, exp=3, res=128)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0xF8, 0xBA, 0x1A, 0x55, 0xD0, 0x2F, 0x85,\n-\t\t\t0xAE, 0x96, 0x7B, 0xB6, 0x2F, 0xB6, 0xCD,\n-\t\t\t0xA8, 0xEB, 0x7E, 0x78, 0xA0, 0x50\n-\t\t},\n-\t\t.len = 20\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0x01, 0x00, 0x01\n-\t\t},\n-\t\t.len = 3\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x2C, 0x60, 0x75, 0x45, 0x98, 0x9D, 0xE0, 0x72,\n-\t\t\t0xA0, 0x9D, 0x3A, 0x9E, 0x03, 0x38, 0x73, 0x3C,\n-\t\t\t0x31, 0x83, 0x04, 0xFE, 0x75, 0x43, 0xE6, 0x17,\n-\t\t\t0x5C, 0x01, 0x29, 0x51, 0x69, 0x33, 0x62, 0x2D,\n-\t\t\t0x78, 0xBE, 0xAE, 0xC4, 0xBC, 0xDE, 0x7E, 0x2C,\n-\t\t\t0x77, 0x84, 0xF2, 0xC5, 0x14, 0xB5, 0x2F, 0xF7,\n-\t\t\t0xC5, 0x94, 0xEF, 0x86, 0x75, 0x75, 0xB5, 0x11,\n-\t\t\t0xE5, 0x0E, 0x0A, 0x29, 0x76, 0xE2, 0xEA, 0x32,\n-\t\t\t0x0E, 0x43, 0x77, 0x7E, 0x2C, 0x27, 0xAC, 0x3B,\n-\t\t\t0x86, 0xA5, 0xDB, 0xC9, 0x48, 0x40, 0xE8, 0x99,\n-\t\t\t0x9A, 0x0A, 0x3D, 0xD6, 0x74, 0xFA, 0x2E, 0x2E,\n-\t\t\t0x5B, 0xAF, 0x8C, 0x99, 0x44, 0x2A, 0x67, 0x38,\n-\t\t\t0x27, 0x41, 0x59, 0x9D, 0xB8, 0x51, 0xC9, 0xF7,\n-\t\t\t0x43, 0x61, 0x31, 0x6E, 0xF1, 0x25, 0x38, 0x7F,\n-\t\t\t0xAE, 0xC6, 0xD0, 0xBB, 0x29, 0x76, 0x3F, 0x46,\n-\t\t\t0x2E, 0x1B, 0xE4, 0x67, 0x71, 0xE3, 0x87, 0x5A\n-\t\t},\n-\t\t.len = 128\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00, 0x0a,\n-\t\t\t0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5, 0xce,\n-\t\t\t0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a, 0xa2,\n-\t\t\t0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde, 0x0a,\n-\t\t\t0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a, 0x3d,\n-\t\t\t0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63, 0x6a,\n-\t\t\t0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27, 0x6e,\n-\t\t\t0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa, 0x72,\n-\t\t\t0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53, 0x87,\n-\t\t\t0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a, 0x62,\n-\t\t\t0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63, 0x18,\n-\t\t\t0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33, 0x4e,\n-\t\t\t0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3, 0x03,\n-\t\t\t0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e, 0xee,\n-\t\t\t0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb, 0xa6,\n-\t\t\t0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde, 0x55\n-\t\t},\n-\t\t.len = 128\n-\t},\n-\t.result_len = 128\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=60, base=50, exp=40, res=60)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0x4F, 0xD8, 0x5C, 0xDB, 0x6D, 0xA2, 0xFA, 0x35,\n-\t\t\t0x9D, 0xD7, 0x97, 0x10, 0x4B, 0x71, 0x5F, 0x53,\n-\t\t\t0xE1, 0xC7, 0x09, 0x74, 0x88, 0xC8, 0x9D, 0x03,\n-\t\t\t0xC0, 0x70, 0xE0, 0xBE, 0xE3, 0xF2, 0x2C, 0x01,\n-\t\t\t0x85, 0xA6, 0x4E, 0x28, 0x6E, 0xD3, 0xB5, 0x18,\n-\t\t\t0x58, 0x69, 0x07, 0xDA, 0x3A, 0x1B, 0x35, 0xCE,\n-\t\t\t0xE6, 0xFA\n-\t\t},\n-\t\t.len = 50\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0x30, 0xA5, 0xD5, 0xF0, 0x42, 0x03, 0xC3, 0x2D,\n-\t\t\t0x2F, 0x58, 0xA8, 0x5C, 0x21, 0x88, 0xDE, 0x82,\n-\t\t\t0x36, 0x44, 0xC1, 0x5A, 0x87, 0x2C, 0x33, 0x19,\n-\t\t\t0x4E, 0xCE, 0x3F, 0x87, 0xFF, 0x98, 0x4B, 0xFC,\n-\t\t\t0x15, 0xC0, 0xBE, 0x9E, 0x8F, 0xF0, 0x6A, 0x62\n-\t\t},\n-\t\t.len = 40\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x59, 0x3D, 0x92, 0xE4, 0xE6, 0x9B, 0x5D, 0x97,\n-\t\t\t0x21, 0xE6, 0x06, 0x60, 0x8B, 0x66, 0x8F, 0xF3,\n-\t\t\t0x63, 0xAE, 0x3A, 0x64, 0x7F, 0xCA, 0xDE, 0x4A,\n-\t\t\t0xE5, 0x49, 0xA2, 0x90, 0x0F, 0xAE, 0x13, 0x10,\n-\t\t\t0xC2, 0x5B, 0x97, 0xED, 0x86, 0x97, 0x16, 0xE2,\n-\t\t\t0x01, 0xF6, 0x7A, 0xF1, 0x7B, 0x4B, 0xC7, 0x7D,\n-\t\t\t0x6B, 0xD7, 0x98, 0xE5, 0x9B, 0x75, 0x1A, 0x6B,\n-\t\t\t0xD6, 0x6E, 0xA3, 0x4E\n-\t\t},\n-\t\t.len = 60\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0xF8, 0x04, 0x0D, 0xD5, 0x09, 0x6C, 0x78, 0x06,\n-\t\t\t0x7D, 0x28, 0x77, 0xA4, 0x0E, 0xA5, 0x49, 0xE7,\n-\t\t\t0x6D, 0xC9, 0x97, 0xD3, 0xC0, 0x7F, 0x82, 0xC6,\n-\t\t\t0x75, 0x51, 0x72, 0xAF, 0x8C, 0x77, 0x97, 0xD0,\n-\t\t\t0xA1, 0x85, 0x54, 0xC0, 0x78, 0x86, 0xD6, 0x40,\n-\t\t\t0x7A, 0x6B, 0xB3, 0xD7, 0x07, 0xCA, 0x27, 0xA3,\n-\t\t\t0x66, 0xB9, 0x98, 0x22, 0xC4, 0x54, 0x18, 0x07,\n-\t\t\t0x65, 0x76, 0x0F, 0x5A\n-\t\t},\n-\t\t.len = 60\n-\t},\n-\t.result_len = 60\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=8, base=65, exp=17, res=8)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0x25, 0x74, 0x41, 0xCE, 0xFA, 0x5C, 0x07, 0x2A,\n-\t\t\t0xD1, 0x74, 0xF3, 0x3D, 0xE1, 0xCC, 0xC3, 0x18,\n-\t\t\t0x7E, 0x4A, 0x21, 0x9F, 0x97, 0xA3, 0x26, 0x85,\n-\t\t\t0x85, 0xD9, 0x9B, 0xE3, 0xBA, 0xB3, 0x70, 0xC9,\n-\t\t\t0x26, 0x68, 0xE4, 0xB7, 0x4C, 0x88, 0x48, 0xC1,\n-\t\t\t0x6B, 0xC6, 0x3C, 0x00, 0x8C, 0x6B, 0xC6, 0x11,\n-\t\t\t0xD0, 0xD6, 0x61, 0x5D, 0xEC, 0xAA, 0xBA, 0x3B,\n-\t\t\t0x7D, 0xB3, 0x0D, 0x3F, 0xA5, 0x4D, 0xEE, 0xE4,\n-\t\t\t0xAC\n-\t\t},\n-\t\t.len = 65\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0x1C, 0x54, 0x2F, 0xCA, 0xDE, 0x4F, 0x17, 0x38,\n-\t\t\t0x69, 0x87, 0xB4, 0xFF, 0x3A, 0x6C, 0x82, 0x70,\n-\t\t\t0x53\n-\t\t},\n-\t\t.len = 17\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x52, 0x06, 0x1A, 0x35, 0x70, 0x33, 0x78, 0x45\n-\t\t},\n-\t\t.len = 8\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0x6B, 0x6D, 0xFA, 0xCB, 0x09, 0x5D, 0x9C, 0xFD\n-\t\t},\n-\t\t.len = 8\n-\t},\n-\t.result_len = 8\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=100, base=150, exp=192, res=100)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0xC1, 0xA1, 0x04, 0xE4, 0x4D, 0x4A, 0xD3, 0x5C,\n-\t\t\t0xB3, 0xD0, 0x16, 0x51, 0xA7, 0xF4, 0x82, 0x6C,\n-\t\t\t0x22, 0xDD, 0x4D, 0xAA, 0x70, 0x30, 0x25, 0xA7,\n-\t\t\t0xFA, 0xA9, 0xF2, 0x20, 0x55, 0x9B, 0xEA, 0x26,\n-\t\t\t0xF6, 0xB5, 0xF8, 0x9C, 0x46, 0x21, 0x85, 0x0E,\n-\t\t\t0x38, 0x73, 0x01, 0xC6, 0x72, 0x67, 0x9B, 0x49,\n-\t\t\t0xCE, 0x48, 0xB7, 0x4A, 0xEE, 0x08, 0x21, 0x26,\n-\t\t\t0xF3, 0x21, 0x77, 0xE7, 0x3C, 0x77, 0xF4, 0x0A,\n-\t\t\t0x82, 0xC8, 0x16, 0x94, 0x6C, 0xBF, 0xA8, 0xD8,\n-\t\t\t0x8B, 0x7D, 0x27, 0x60, 0xAC, 0x06, 0x69, 0x7E,\n-\t\t\t0x46, 0x2C, 0xE2, 0xD1, 0x13, 0x50, 0x7D, 0xCE,\n-\t\t\t0x4D, 0xC4, 0x5D, 0x81, 0xFB, 0x6B, 0x11, 0x4A,\n-\t\t\t0x2D, 0xA2, 0x03, 0x55, 0x77, 0x8C, 0x3D, 0xA1,\n-\t\t\t0xAD, 0xBE, 0x9C, 0x72, 0xE5, 0xA5, 0xFB, 0x49,\n-\t\t\t0x5F, 0x13, 0x48, 0xC7, 0xAC, 0xD1, 0x0F, 0x5E,\n-\t\t\t0xDF, 0x9C, 0xC7, 0xF5, 0x19, 0xFD, 0xC5, 0x77,\n-\t\t\t0x27, 0x8D, 0xC4, 0x1D, 0x90, 0x8C, 0x20, 0x96,\n-\t\t\t0xC8, 0x6A, 0x0D, 0x2F, 0xE2, 0x8B, 0xB0, 0x58,\n-\t\t\t0xF8, 0xC4, 0x31, 0x0A, 0x17, 0x11\n-\t\t},\n-\t\t.len = 150\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0xC6, 0x20, 0x99, 0xD9, 0xBC, 0xE2, 0xAD, 0x74,\n-\t\t\t0x11, 0x6F, 0x74, 0x14, 0x72, 0xB8, 0x09, 0xCB,\n-\t\t\t0x5C, 0x74, 0x11, 0x21, 0x17, 0x84, 0x02, 0xDC,\n-\t\t\t0x70, 0x59, 0x20, 0x79, 0x40, 0x7B, 0x0E, 0x52,\n-\t\t\t0xAD, 0x00, 0x38, 0x4F, 0x5A, 0xE5, 0x0D, 0x28,\n-\t\t\t0xB5, 0xF8, 0xDC, 0x54, 0x92, 0xB2, 0xB0, 0xA8,\n-\t\t\t0xE8, 0x35, 0x1B, 0x63, 0x0D, 0x6A, 0x50, 0x8D,\n-\t\t\t0xE1, 0x3E, 0x7A, 0xDD, 0x42, 0x7A, 0xD0, 0xB4,\n-\t\t\t0x9D, 0x63, 0x36, 0x03, 0xC0, 0x9B, 0xA0, 0x91,\n-\t\t\t0x8B, 0xBC, 0x45, 0x53, 0x93, 0x2C, 0xFC, 0xDD,\n-\t\t\t0x4F, 0xBD, 0x96, 0x0B, 0x63, 0xEB, 0xEF, 0x50,\n-\t\t\t0xAC, 0x99, 0x45, 0xA7, 0x0D, 0xC6, 0xEA, 0x98,\n-\t\t\t0xBC, 0xD7, 0x63, 0x56, 0x8C, 0x75, 0x68, 0xAE,\n-\t\t\t0xF0, 0xB4, 0x66, 0xA0, 0x4D, 0xC5, 0x71, 0xB9,\n-\t\t\t0x4E, 0xCB, 0xF6, 0xCA, 0xC9, 0x1B, 0x3B, 0x55,\n-\t\t\t0x91, 0x39, 0x25, 0xBD, 0x98, 0xAA, 0xDA, 0xF2,\n-\t\t\t0x8A, 0xCB, 0x8E, 0x56, 0x09, 0xBF, 0xC4, 0x1D,\n-\t\t\t0xFA, 0x23, 0x48, 0xF6, 0x9A, 0xD2, 0xD3, 0x2B,\n-\t\t\t0xED, 0x60, 0x9B, 0x4B, 0x63, 0xD8, 0x8C, 0x6A,\n-\t\t\t0x28, 0xA3, 0x4C, 0x85, 0x43, 0x4D, 0x5C, 0x4A,\n-\t\t\t0xA7, 0xA9, 0x9F, 0x7E, 0x13, 0x5B, 0x36, 0xED,\n-\t\t\t0xD9, 0x53, 0xBE, 0x12, 0xFF, 0x17, 0x9F, 0x70,\n-\t\t\t0xA4, 0xD2, 0x42, 0x72, 0x70, 0x51, 0x70, 0x3F,\n-\t\t\t0x5A, 0xBA, 0x33, 0x0E, 0xBB, 0x4C, 0xA0, 0x4A\n-\t\t},\n-\t\t.len = 192\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x07, 0x5E, 0x28, 0x4F, 0xD1, 0xEA, 0x5C, 0x1D,\n-\t\t\t0xF8, 0xBF, 0x29, 0xF0, 0x63, 0xCC, 0xF7, 0x6D,\n-\t\t\t0x99, 0x67, 0xCE, 0xE3, 0x05, 0x16, 0x16, 0x8C,\n-\t\t\t0x3A, 0x07, 0xC0, 0x63, 0x70, 0xB9, 0x1A, 0x24,\n-\t\t\t0xED, 0xE9, 0xF0, 0xEE, 0xD9, 0xAB, 0x18, 0xD4,\n-\t\t\t0x59, 0xB4, 0xD2, 0x77, 0x44, 0x94, 0x72, 0xFE,\n-\t\t\t0x19, 0x26, 0x50, 0x47, 0x77, 0xAD, 0x0A, 0x45,\n-\t\t\t0x76, 0x4B, 0x22, 0xDB, 0x05, 0x13, 0x67, 0x40,\n-\t\t\t0x9A, 0x36, 0x6C, 0x5E, 0xE8, 0xED, 0x40, 0x60,\n-\t\t\t0x86, 0x40, 0x2F, 0x30, 0x9E, 0x4B, 0x61, 0x73,\n-\t\t\t0x2E, 0x76, 0x8A, 0xB0, 0x49, 0x04, 0x1A, 0x82,\n-\t\t\t0xB7, 0xEF, 0xB2, 0xB5, 0xB4, 0xE0, 0x87, 0xF0,\n-\t\t\t0xB4, 0x53, 0xB2, 0xBE\n-\t\t},\n-\t\t.len = 100\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0x54, 0x58, 0x5C, 0xBA, 0xAE, 0xC1, 0xB4, 0x46,\n-\t\t\t0x50, 0xAF, 0xD0, 0xA6, 0x03, 0x9D, 0x74, 0x84,\n-\t\t\t0x6F, 0x89, 0x07, 0xA6, 0x63, 0xE7, 0x34, 0xB2,\n-\t\t\t0x55, 0x0E, 0xD5, 0x42, 0xC9, 0xBF, 0xD1, 0x89,\n-\t\t\t0x54, 0x0B, 0x76, 0xF7, 0x0E, 0xA1, 0x42, 0x02,\n-\t\t\t0x72, 0xDC, 0x28, 0x5A, 0x68, 0x10, 0xA0, 0x84,\n-\t\t\t0xA4, 0x72, 0x4D, 0x40, 0x69, 0xBC, 0x18, 0xC9,\n-\t\t\t0x92, 0x69, 0xB8, 0x52, 0x2A, 0xB1, 0xA3, 0x43,\n-\t\t\t0x80, 0xA9, 0x55, 0x78, 0xEA, 0xD9, 0x54, 0xF4,\n-\t\t\t0x3A, 0xDD, 0x24, 0x4E, 0x22, 0x9D, 0x89, 0x40,\n-\t\t\t0x8F, 0x50, 0xA5, 0xF5, 0x0F, 0xFA, 0x38, 0xBB,\n-\t\t\t0xE8, 0xD7, 0x21, 0x6B, 0xEA, 0xB1, 0x28, 0x48,\n-\t\t\t0xEB, 0x75, 0xB1, 0xC7\n-\t\t},\n-\t\t.len = 100\n-\t},\n-\t.result_len = 100\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=255, base=20, exp=10, res=255)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0xD8, 0x21, 0xD2, 0x76, 0xAE, 0x01, 0x62, 0xD8,\n-\t\t\t0x8C, 0x80, 0x01, 0x25, 0xC7, 0xE8, 0x4E, 0x0F,\n-\t\t\t0x7F, 0x23, 0xFE, 0xBB\n-\t\t},\n-\t\t.len = 20\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0xE5, 0xCE, 0x50, 0xE8, 0x97, 0x32, 0xFB, 0x5C,\n-\t\t\t0xFC, 0x62\n-\t\t},\n-\t\t.len = 10\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x1F, 0xA8, 0xAC, 0x32, 0x6C, 0x20, 0xBE, 0x1D,\n-\t\t\t0x88, 0xE9, 0x94, 0x7E, 0xDE, 0xB5, 0x15, 0xA5,\n-\t\t\t0xF3, 0x45, 0x77, 0xB3, 0x3E, 0xDD, 0xDD, 0xAE,\n-\t\t\t0xEA, 0xAE, 0x32, 0x81, 0x37, 0xAE, 0x26, 0xC5,\n-\t\t\t0x6F, 0x3A, 0x75, 0x1F, 0x4F, 0xA2, 0xA3, 0x8B,\n-\t\t\t0xDC, 0x52, 0x3C, 0xD5, 0x42, 0x00, 0x58, 0x37,\n-\t\t\t0xB3, 0x5B, 0xC9, 0x78, 0xFA, 0x48, 0xFE, 0x4B,\n-\t\t\t0x81, 0xFB, 0x4C, 0x5D, 0x9F, 0x5E, 0x4F, 0x56,\n-\t\t\t0x30, 0x79, 0x71, 0x1E, 0xC5, 0x8E, 0xC2, 0x2E,\n-\t\t\t0x9D, 0x18, 0xD8, 0x34, 0x0E, 0xDB, 0xCB, 0x02,\n-\t\t\t0xA7, 0x37, 0x00, 0x44, 0x57, 0x2A, 0x11, 0x85,\n-\t\t\t0x81, 0x06, 0x28, 0xB4, 0x95, 0x79, 0xE2, 0x60,\n-\t\t\t0x39, 0x66, 0x34, 0x2F, 0x19, 0xD4, 0x42, 0x70,\n-\t\t\t0xA8, 0xE9, 0x51, 0xBC, 0xB4, 0x04, 0xD6, 0x4B,\n-\t\t\t0xE1, 0x4A, 0xEE, 0x6F, 0x69, 0xD7, 0x82, 0x07,\n-\t\t\t0x59, 0xD6, 0xB0, 0xAC, 0x22, 0x28, 0xB8, 0x70,\n-\t\t\t0x5F, 0xD2, 0x0D, 0x15, 0x6D, 0xED, 0xEB, 0x8A,\n-\t\t\t0xD5, 0x64, 0x16, 0x7C, 0x12, 0x25, 0x76, 0xFD,\n-\t\t\t0x8A, 0x8D, 0xC5, 0xEA, 0xF8, 0xA9, 0x04, 0x65,\n-\t\t\t0x58, 0x6D, 0x67, 0x2F, 0xA7, 0x3E, 0x2C, 0x96,\n-\t\t\t0x55, 0x11, 0xAA, 0x10, 0xE0, 0x1B, 0x0F, 0x1C,\n-\t\t\t0x89, 0x10, 0x7C, 0x63, 0xCB, 0x0B, 0xB8, 0x1C,\n-\t\t\t0x49, 0x16, 0xC1, 0xB3, 0xA5, 0x57, 0x87, 0x4F,\n-\t\t\t0x80, 0x8B, 0x18, 0xF0, 0x46, 0xCE, 0xE4, 0x95,\n-\t\t\t0x2F, 0x9C, 0xE7, 0xB7, 0x40, 0x1C, 0xB4, 0xA3,\n-\t\t\t0xD4, 0x30, 0x9C, 0xFD, 0x95, 0x35, 0x57, 0x10,\n-\t\t\t0x50, 0x40, 0xDA, 0x47, 0x8E, 0x21, 0xAE, 0x05,\n-\t\t\t0xF8, 0xA8, 0x72, 0xA5, 0x68, 0xE1, 0xA2, 0xAB,\n-\t\t\t0x36, 0x0D, 0x4B, 0xDB, 0x7B, 0xBF, 0x7F, 0x51,\n-\t\t\t0x51, 0xC9, 0xBB, 0x3F, 0xF7, 0x76, 0x45, 0x78,\n-\t\t\t0xAC, 0x3F, 0x56, 0xF4, 0x27, 0x7E, 0xEF, 0x02,\n-\t\t\t0xED, 0x41, 0x15, 0xDB, 0xE4, 0x81, 0x59\n-\t\t},\n-\t\t.len = 255\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0x71, 0x3C, 0x6C, 0x7A, 0x19, 0x31, 0xF8, 0x94,\n-\t\t\t0xC9, 0xAA, 0x25, 0x69, 0xA7, 0xF2, 0x28, 0x70,\n-\t\t\t0x84, 0x5D, 0xEC, 0x40, 0xC8, 0xF9, 0xC5, 0x79,\n-\t\t\t0xF9, 0x87, 0xD1, 0xA0, 0xC1, 0x5A, 0x06, 0xE4,\n-\t\t\t0x65, 0xB8, 0x29, 0x0B, 0x2B, 0xFE, 0x67, 0xF0,\n-\t\t\t0x91, 0x96, 0xE1, 0xCD, 0x5A, 0xCE, 0x44, 0xA3,\n-\t\t\t0x4F, 0xE8, 0xBE, 0xC6, 0xA3, 0x0A, 0xCB, 0xF5,\n-\t\t\t0x7D, 0x8B, 0x9B, 0x2F, 0x4E, 0xC9, 0x54, 0x48,\n-\t\t\t0xA4, 0xC2, 0x09, 0xCE, 0xA5, 0x93, 0x1F, 0x43,\n-\t\t\t0xC2, 0xCE, 0xFB, 0xBB, 0x69, 0x29, 0x03, 0x74,\n-\t\t\t0xD6, 0x25, 0x47, 0x6B, 0xAC, 0x4E, 0x44, 0x8C,\n-\t\t\t0x39, 0x2F, 0xB2, 0xDD, 0x15, 0x1B, 0xA3, 0x3D,\n-\t\t\t0xA4, 0x0C, 0xFF, 0xCB, 0x05, 0xC2, 0x81, 0x97,\n-\t\t\t0x16, 0xE2, 0xAC, 0x8A, 0xF3, 0xED, 0x80, 0xA4,\n-\t\t\t0xC5, 0xFC, 0xF5, 0x6C, 0x4B, 0xBB, 0x05, 0x91,\n-\t\t\t0xD4, 0x0F, 0xDA, 0x70, 0x7C, 0x9A, 0xA1, 0x63,\n-\t\t\t0x15, 0xEE, 0xBB, 0x17, 0xE6, 0x20, 0x50, 0x74,\n-\t\t\t0x36, 0x9C, 0xA1, 0x10, 0x29, 0x22, 0xFB, 0x7E,\n-\t\t\t0x2A, 0x08, 0xF3, 0x07, 0xEA, 0xCD, 0x2C, 0x50,\n-\t\t\t0x18, 0x15, 0x66, 0x87, 0x74, 0x19, 0x11, 0x2B,\n-\t\t\t0x77, 0x85, 0xA0, 0x57, 0xA7, 0xEB, 0x6E, 0x15,\n-\t\t\t0x15, 0x0D, 0xA4, 0x18, 0x5D, 0x54, 0x13, 0xE3,\n-\t\t\t0x33, 0x12, 0x8D, 0xA3, 0xEF, 0x54, 0xE6, 0x1E,\n-\t\t\t0xDB, 0x8F, 0x3D, 0x02, 0x3C, 0xCB, 0x34, 0x93,\n-\t\t\t0x31, 0x1D, 0x4D, 0x3E, 0x9C, 0x22, 0x04, 0xD1,\n-\t\t\t0x19, 0x53, 0x45, 0xE5, 0xBF, 0xF8, 0x70, 0x1A,\n-\t\t\t0xEA, 0x52, 0x93, 0x2A, 0x26, 0x8A, 0x1E, 0x47,\n-\t\t\t0xCE, 0x83, 0x5B, 0x35, 0x9A, 0xD2, 0x75, 0xC6,\n-\t\t\t0xC6, 0x20, 0x84, 0x9F, 0x74, 0x69, 0x69, 0xB8,\n-\t\t\t0x29, 0xD8, 0xA4, 0x70, 0x91, 0x42, 0x06, 0x25,\n-\t\t\t0x38, 0xCB, 0x42, 0x75, 0x52, 0xEF, 0xB8, 0x64,\n-\t\t\t0x4F, 0xC5, 0x7C, 0xC4, 0x09, 0xDB, 0x12\n-\t\t},\n-\t\t.len = 255\n-\t},\n-\t.result_len = 255\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=112, base=257, exp=43, res=112)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0x53, 0x63, 0xB0, 0x3A, 0x30, 0xDE, 0x07, 0xBC,\n-\t\t\t0xE4, 0x4B, 0x52, 0x37, 0x9C, 0xD8, 0x5A, 0xCD,\n-\t\t\t0x03, 0xE1, 0xEA, 0x6D, 0xDE, 0x4C, 0x19, 0xE6,\n-\t\t\t0xA2, 0x0F, 0xAE, 0x56, 0xCD, 0xB2, 0xB6, 0x5B,\n-\t\t\t0x31, 0xF5, 0x41, 0x48, 0x8D, 0xA2, 0xC7, 0x0C,\n-\t\t\t0x19, 0x32, 0x6D, 0x58, 0x10, 0xD5, 0xF0, 0x64,\n-\t\t\t0xF9, 0xF5, 0xD7, 0xFE, 0x37, 0x4A, 0xD8, 0xE3,\n-\t\t\t0xBF, 0xDF, 0xCB, 0x45, 0xD5, 0xBF, 0xB9, 0x2A,\n-\t\t\t0x60, 0xF8, 0x52, 0xB0, 0xB5, 0x22, 0x76, 0xBD,\n-\t\t\t0xD3, 0x0D, 0xD4, 0xE1, 0x42, 0xC4, 0x8C, 0x47,\n-\t\t\t0x2D, 0x04, 0x25, 0x1B, 0xFB, 0x21, 0xFD, 0x80,\n-\t\t\t0xC0, 0xCE, 0x9D, 0x32, 0x76, 0x8E, 0x18, 0x28,\n-\t\t\t0xDC, 0x0F, 0x44, 0x37, 0xF8, 0x61, 0x45, 0x93,\n-\t\t\t0xD3, 0x62, 0x21, 0xEE, 0x8B, 0x89, 0x8B, 0xAF,\n-\t\t\t0x8B, 0xE9, 0xA5, 0xD2, 0x00, 0xF5, 0xFF, 0xE6,\n-\t\t\t0xE0, 0x56, 0x9D, 0x41, 0x13, 0xBC, 0xD6, 0x6E,\n-\t\t\t0xC9, 0xE8, 0xE8, 0xC7, 0x61, 0x00, 0x7D, 0x91,\n-\t\t\t0x59, 0xAC, 0x6A, 0x24, 0x86, 0x3C, 0x50, 0xFB,\n-\t\t\t0x49, 0xC4, 0xB9, 0x41, 0xCD, 0xF0, 0xD9, 0xE7,\n-\t\t\t0xE1, 0x54, 0x3F, 0x17, 0x3B, 0xC7, 0x12, 0x20,\n-\t\t\t0x6E, 0xC5, 0x80, 0x11, 0xA5, 0x78, 0x72, 0xCA,\n-\t\t\t0xBC, 0x90, 0xB7, 0xC5, 0xFF, 0x78, 0xE5, 0x71,\n-\t\t\t0x62, 0x4C, 0xCC, 0x6C, 0xEA, 0x76, 0xE3, 0xB6,\n-\t\t\t0x00, 0x54, 0x31, 0x72, 0x5A, 0xFE, 0x14, 0xC3,\n-\t\t\t0x60, 0x3A, 0x79, 0x97, 0x26, 0x87, 0x69, 0x8D,\n-\t\t\t0x44, 0x8E, 0x8B, 0xE0, 0xBC, 0x5C, 0x9F, 0xDE,\n-\t\t\t0xD0, 0x90, 0xA2, 0x85, 0xC8, 0x3E, 0x7E, 0xA0,\n-\t\t\t0x42, 0xE2, 0x3B, 0xEE, 0x0C, 0x59, 0x1E, 0x72,\n-\t\t\t0x62, 0xA5, 0xEE, 0x20, 0xE0, 0xFE, 0x0D, 0xD3,\n-\t\t\t0x9F, 0xA9, 0x84, 0xBC, 0xD0, 0x6E, 0x5E, 0xC2,\n-\t\t\t0x0B, 0xF2, 0xAE, 0xB6, 0xE6, 0xC6, 0x88, 0xF9,\n-\t\t\t0x51, 0xF8, 0x02, 0x08, 0xC6, 0x99, 0x73, 0xF2,\n-\t\t\t0x36\n-\t\t},\n-\t\t.len = 257\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0xCA, 0x5C, 0x73, 0xF7, 0x8B, 0x1F, 0x95, 0xE4,\n-\t\t\t0x0E, 0x9B, 0x47, 0xDC, 0x03, 0x96, 0x75, 0xB4,\n-\t\t\t0x48, 0x74, 0x73, 0xBE, 0xF8, 0x92, 0x80, 0xE4,\n-\t\t\t0x93, 0x5D, 0x87, 0x7D, 0x74, 0xF7, 0x45, 0xEF,\n-\t\t\t0x8E, 0x53, 0x9C, 0x03, 0xB0, 0xD6, 0xF3, 0xBF,\n-\t\t\t0x86, 0xB2, 0xCD\n-\t\t},\n-\t\t.len = 43\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x01, 0x0E, 0x8C, 0x1B, 0x19, 0xF6, 0xB0, 0x0D,\n-\t\t\t0x8D, 0xFF, 0x12, 0x74, 0xF0, 0xD0, 0xB1, 0xA2,\n-\t\t\t0x49, 0xA4, 0xA3, 0x9C, 0x4D, 0xFA, 0xA7, 0xB7,\n-\t\t\t0x6E, 0x45, 0xCC, 0x0D, 0x75, 0xC7, 0xF7, 0x99,\n-\t\t\t0x1F, 0x01, 0x44, 0x7B, 0xF2, 0xF9, 0x73, 0x67,\n-\t\t\t0x75, 0xD9, 0x4C, 0x2F, 0xA9, 0xB4, 0x59, 0x9E,\n-\t\t\t0xF9, 0x2C, 0xB9, 0x14, 0x5D, 0x5C, 0x18, 0x72,\n-\t\t\t0xEC, 0x27, 0x1A, 0x2D, 0xFB, 0xDA, 0xEB, 0x2F,\n-\t\t\t0x98, 0xA9, 0xC2, 0x01, 0x75, 0x7A, 0x27, 0x07,\n-\t\t\t0x94, 0x71, 0x3F, 0x90, 0xDF, 0x56, 0x6F, 0x23,\n-\t\t\t0x47, 0x12, 0xAD, 0x32, 0x7A, 0xBC, 0x91, 0x36,\n-\t\t\t0x43, 0xD2, 0x88, 0x3D, 0x2C, 0x31, 0x85, 0xE6,\n-\t\t\t0x22, 0x2E, 0xCF, 0x53, 0x87, 0x0D, 0xAE, 0x72,\n-\t\t\t0x31, 0x21, 0x52, 0x0C, 0xDF, 0xAC, 0xEA, 0x57\n-\t\t},\n-\t\t.len = 112\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0x20, 0x7E, 0x78, 0xFC, 0x54, 0x40, 0x47, 0xED,\n-\t\t\t0x7B, 0x26, 0x21, 0x94, 0x6D, 0x9C, 0xDC, 0xB7,\n-\t\t\t0x7C, 0xB8, 0xDE, 0x57, 0x3C, 0x64, 0x47, 0x50,\n-\t\t\t0xDB, 0x92, 0x0A, 0x5A, 0x85, 0x77, 0x84, 0xE3,\n-\t\t\t0xC7, 0xEA, 0x33, 0xA2, 0x63, 0xDA, 0x63, 0xE3,\n-\t\t\t0xDF, 0x07, 0x32, 0x85, 0xDC, 0xC3, 0xF0, 0x7C,\n-\t\t\t0xD8, 0x44, 0xC4, 0xDE, 0x2C, 0xB7, 0x91, 0xAE,\n-\t\t\t0xCD, 0xA2, 0xB3, 0x6B, 0x43, 0x04, 0x88, 0xBE,\n-\t\t\t0x3B, 0x50, 0xE1, 0x88, 0xD0, 0x20, 0x04, 0x36,\n-\t\t\t0xA4, 0xA0, 0xB0, 0x3B, 0x61, 0x9B, 0x83, 0xDB,\n-\t\t\t0x05, 0x77, 0x5A, 0x5E, 0x87, 0xA6, 0xBE, 0x6A,\n-\t\t\t0x2A, 0xB4, 0x30, 0x10, 0x8D, 0x3B, 0xBC, 0x84,\n-\t\t\t0x9E, 0xB2, 0x21, 0x7E, 0xAC, 0x67, 0x94, 0x9F,\n-\t\t\t0xF1, 0x32, 0x3C, 0xF0, 0x94, 0x83, 0xF8, 0x19\n-\t\t},\n-\t\t.len = 112\n-\t},\n-\t.result_len = 112\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=299, base=240, exp=321, res=299)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0xAF, 0xE4, 0xCF, 0x9F, 0x7C, 0x20, 0x72, 0xE9,\n-\t\t\t0x50, 0x2E, 0xE5, 0xE4, 0xEF, 0x80, 0x28, 0xB3,\n-\t\t\t0x3A, 0x92, 0xAC, 0xCD, 0xF1, 0x6B, 0x7D, 0x83,\n-\t\t\t0x78, 0x4E, 0x9B, 0x30, 0x1E, 0xF4, 0x11, 0x15,\n-\t\t\t0x49, 0xAC, 0x06, 0xA2, 0x92, 0xB9, 0x91, 0x1B,\n-\t\t\t0xE8, 0xC8, 0xBC, 0x8A, 0x6F, 0xB2, 0xB8, 0x7C,\n-\t\t\t0xC5, 0xD3, 0x68, 0x60, 0xA4, 0x37, 0x7A, 0x6E,\n-\t\t\t0x3A, 0x1C, 0xAE, 0xAC, 0x70, 0x7B, 0x03, 0xE0,\n-\t\t\t0xDC, 0x7D, 0x51, 0x2E, 0x04, 0xC1, 0xD4, 0xA8,\n-\t\t\t0x5A, 0xE1, 0xE8, 0xAD, 0x83, 0x0C, 0x0C, 0x2D,\n-\t\t\t0x93, 0x8A, 0x07, 0x25, 0xC6, 0xE1, 0xAB, 0xD7,\n-\t\t\t0x2F, 0xC4, 0x14, 0x2E, 0x68, 0x89, 0xA7, 0xEA,\n-\t\t\t0x4E, 0x7B, 0xC4, 0x05, 0xD4, 0xB7, 0xC1, 0x9B,\n-\t\t\t0x9D, 0x8D, 0x58, 0x33, 0xE3, 0xB0, 0x58, 0xD8,\n-\t\t\t0xCF, 0x6D, 0xA9, 0xC6, 0x96, 0xE3, 0x6E, 0xAA,\n-\t\t\t0x23, 0x17, 0x19, 0x74, 0xE0, 0x7B, 0x50, 0x7A,\n-\t\t\t0x57, 0x49, 0xFD, 0xFA, 0x3E, 0x7D, 0xF9, 0xB6,\n-\t\t\t0x30, 0x5F, 0x1C, 0xE4, 0x5F, 0xC7, 0x3D, 0x5B,\n-\t\t\t0x9E, 0xF5, 0xB6, 0x2F, 0xEA, 0xCF, 0x31, 0x35,\n-\t\t\t0xC0, 0x60, 0xDE, 0x18, 0xC5, 0x0D, 0xBB, 0xC5,\n-\t\t\t0xD1, 0x1D, 0x25, 0x7C, 0x8C, 0x35, 0x8A, 0x71,\n-\t\t\t0xA8, 0x01, 0x9E, 0xEA, 0x8F, 0xD4, 0x5D, 0x52,\n-\t\t\t0x86, 0xB7, 0x11, 0xC8, 0xF2, 0x97, 0xD0, 0x73,\n-\t\t\t0x7C, 0xAB, 0xBB, 0xF4, 0x38, 0x4E, 0x48, 0xB5,\n-\t\t\t0x70, 0x35, 0x2A, 0xC5, 0x14, 0x86, 0x2E, 0x64,\n-\t\t\t0x91, 0x32, 0x37, 0x5E, 0x1A, 0x00, 0xAC, 0xF1,\n-\t\t\t0xFC, 0x36, 0xEA, 0x7F, 0x50, 0xAF, 0x02, 0xEC,\n-\t\t\t0x06, 0xE8, 0x55, 0x68, 0x0D, 0x9A, 0x58, 0x4D,\n-\t\t\t0xBD, 0xB9, 0x62, 0x25, 0xAB, 0x94, 0xD7, 0x37,\n-\t\t\t0xAD, 0xB4, 0x9F, 0xB4, 0x3A, 0x07, 0x45, 0x4B\n-\t\t},\n-\t\t.len = 240\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0xB1, 0xC2, 0x86, 0xFA, 0xE2, 0xF1, 0x71, 0x9C,\n-\t\t\t0x61, 0x23, 0xAB, 0x37, 0xC6, 0x4F, 0x17, 0xFE,\n-\t\t\t0x4D, 0xAC, 0x11, 0xD4, 0x36, 0xEE, 0xCB, 0xAE,\n-\t\t\t0x46, 0x88, 0xA4, 0x92, 0x20, 0x6D, 0xDC, 0xF1,\n-\t\t\t0xE4, 0x94, 0x72, 0x07, 0x64, 0x84, 0xF4, 0x83,\n-\t\t\t0x31, 0x0C, 0x04, 0xF7, 0x5B, 0x68, 0xE6, 0x7A,\n-\t\t\t0x6C, 0xCD, 0x6C, 0xBF, 0x03, 0x07, 0x5A, 0x91,\n-\t\t\t0x37, 0x3A, 0x73, 0xFF, 0xB2, 0x11, 0x88, 0x39,\n-\t\t\t0x19, 0xEB, 0x1C, 0x0E, 0x45, 0x99, 0xE6, 0x4E,\n-\t\t\t0xE4, 0xB1, 0x57, 0xBE, 0xBE, 0x7A, 0xE8, 0x56,\n-\t\t\t0x19, 0x92, 0xAC, 0xBD, 0x78, 0xCC, 0x54, 0xDC,\n-\t\t\t0x2D, 0xE6, 0x7D, 0x61, 0xE1, 0x27, 0xA7, 0x43,\n-\t\t\t0x46, 0x25, 0x51, 0x95, 0x47, 0xF6, 0xB1, 0x68,\n-\t\t\t0x17, 0xE6, 0x21, 0xD4, 0x83, 0x1E, 0x32, 0xAF,\n-\t\t\t0x22, 0xA4, 0x7D, 0x3D, 0x1F, 0xE6, 0x43, 0x96,\n-\t\t\t0x64, 0xAB, 0xC5, 0x81, 0xBC, 0x79, 0x14, 0x54,\n-\t\t\t0x02, 0x78, 0x79, 0x71, 0x58, 0xC2, 0x2E, 0x56,\n-\t\t\t0x21, 0x6B, 0x40, 0xDB, 0x79, 0xD1, 0x80, 0x5D,\n-\t\t\t0x61, 0xF0, 0x9F, 0x4A, 0xC3, 0x8F, 0xAC, 0x98,\n-\t\t\t0x94, 0x88, 0x2C, 0xA5, 0xCB, 0x06, 0x47, 0x73,\n-\t\t\t0x27, 0x71, 0xA8, 0x0C, 0xBD, 0xFD, 0x83, 0xBF,\n-\t\t\t0xA2, 0xCC, 0x91, 0x63, 0x9D, 0xC5, 0x58, 0x50,\n-\t\t\t0x53, 0x98, 0xA0, 0x5F, 0x0B, 0xDE, 0x15, 0x65,\n-\t\t\t0xFB, 0x5D, 0xF1, 0x9C, 0xD0, 0xC3, 0x6B, 0x4D,\n-\t\t\t0x31, 0x20, 0x2F, 0x4D, 0x4F, 0x9D, 0xEB, 0xCB,\n-\t\t\t0xFC, 0xDA, 0x54, 0xC1, 0x57, 0x10, 0x0F, 0xFC,\n-\t\t\t0xD2, 0xA7, 0x44, 0x0E, 0x89, 0x0D, 0x89, 0x56,\n-\t\t\t0x1E, 0x40, 0x64, 0xFF, 0x9E, 0xB1, 0x5C, 0x9A,\n-\t\t\t0x6E, 0xE5, 0xE9, 0x48, 0xAB, 0x27, 0x91, 0x9A,\n-\t\t\t0x3B, 0x8D, 0xB6, 0xA0, 0xD6, 0xD8, 0x9B, 0xBD,\n-\t\t\t0x0D, 0x1D, 0x90, 0xED, 0x54, 0xE1, 0x75, 0x5B,\n-\t\t\t0x89, 0xE1, 0x0C, 0xC7, 0x42, 0xD7, 0x68, 0xCB,\n-\t\t\t0x41, 0x59, 0xC1, 0x96, 0xD9, 0x77, 0x88, 0xF1,\n-\t\t\t0x68, 0x90, 0xDA, 0xE0, 0xB7, 0x1E, 0x2C, 0xDB,\n-\t\t\t0x27, 0x78, 0xC0, 0x15, 0x68, 0x9E, 0xF7, 0x48,\n-\t\t\t0x45, 0xFC, 0x22, 0x5D, 0x2B, 0xFA, 0xC7, 0x81,\n-\t\t\t0x26, 0x60, 0xF7, 0x50, 0xEE, 0xF9, 0x61, 0xF8,\n-\t\t\t0x59, 0x28, 0x92, 0xEE, 0xD7, 0x92, 0x5F, 0x5E,\n-\t\t\t0xA5, 0x5A, 0x4C, 0xC7, 0x89, 0x9B, 0x9F, 0x8F,\n-\t\t\t0x01, 0x3B, 0x9D, 0x8D, 0xF8, 0x6B, 0xEE, 0x64,\n-\t\t\t0x54\n-\t\t},\n-\t\t.len = 321\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x4A, 0x18, 0x9C, 0xCB, 0x90, 0x71, 0x8E, 0xD3,\n-\t\t\t0xCA, 0xEB, 0xF1, 0xE7, 0xE8, 0xB0, 0x19, 0x9C,\n-\t\t\t0x05, 0x51, 0x29, 0x8C, 0xB9, 0x6D, 0x1B, 0x05,\n-\t\t\t0xDC, 0x16, 0x91, 0x0E, 0x69, 0xF3, 0x76, 0x29,\n-\t\t\t0x9D, 0x91, 0x21, 0x98, 0x56, 0x9A, 0x22, 0x20,\n-\t\t\t0xDF, 0x75, 0x4D, 0x40, 0x51, 0x99, 0x6E, 0xEA,\n-\t\t\t0x37, 0x22, 0xF4, 0x27, 0x04, 0x6E, 0xDC, 0xB2,\n-\t\t\t0xF5, 0xF6, 0xF8, 0xD6, 0xA8, 0xB7, 0x2D, 0xB7,\n-\t\t\t0x18, 0x44, 0xF7, 0x62, 0x91, 0x44, 0x97, 0x91,\n-\t\t\t0x6C, 0x14, 0x7E, 0xEB, 0x00, 0xB0, 0x3F, 0x7D,\n-\t\t\t0x7B, 0x4A, 0xD0, 0x04, 0xD2, 0xCC, 0x5A, 0x22,\n-\t\t\t0xB5, 0x0E, 0xAB, 0x1A, 0xB0, 0xD7, 0x97, 0xDD,\n-\t\t\t0xE5, 0x78, 0xA9, 0x97, 0xF4, 0xC7, 0xE0, 0x28,\n-\t\t\t0x00, 0xF3, 0x48, 0xCA, 0x69, 0xD0, 0xE8, 0x43,\n-\t\t\t0x12, 0x82, 0x24, 0xBA, 0x28, 0xBD, 0x8E, 0xCB,\n-\t\t\t0xB1, 0x98, 0x08, 0xC5, 0x0F, 0xF2, 0xE9, 0xA2,\n-\t\t\t0x6C, 0xCC, 0xA9, 0x21, 0xA6, 0x38, 0xAE, 0x88,\n-\t\t\t0x35, 0x5E, 0xBB, 0xEF, 0x37, 0xAB, 0xDA, 0x07,\n-\t\t\t0x5F, 0x0A, 0xB4, 0x29, 0x65, 0x24, 0x22, 0x6C,\n-\t\t\t0x9E, 0xF5, 0x19, 0xA4, 0x8E, 0x5A, 0xFA, 0xFC,\n-\t\t\t0x97, 0x8A, 0xE8, 0x2B, 0x6D, 0x4B, 0xD0, 0xFB,\n-\t\t\t0x86, 0xB9, 0xE7, 0x2C, 0x08, 0x25, 0x17, 0x90,\n-\t\t\t0x77, 0x54, 0xE0, 0xBA, 0x0F, 0x59, 0x6C, 0x8C,\n-\t\t\t0x0E, 0xCF, 0x54, 0x55, 0x6C, 0xF1, 0x65, 0x48,\n-\t\t\t0xCC, 0xF4, 0xAB, 0xA1, 0x91, 0x07, 0x29, 0xFC,\n-\t\t\t0x46, 0xBC, 0x2C, 0x85, 0xA1, 0x0C, 0x8A, 0x77,\n-\t\t\t0x7A, 0xC6, 0x01, 0x34, 0xCE, 0x92, 0x1D, 0x88,\n-\t\t\t0x54, 0x23, 0x26, 0x9B, 0x6B, 0x80, 0x6D, 0x08,\n-\t\t\t0x99, 0xAE, 0xC0, 0xF6, 0x45, 0x97, 0xAF, 0xCD,\n-\t\t\t0x2F, 0x4A, 0x7E, 0xAB, 0xD8, 0x31, 0x48, 0xA1,\n-\t\t\t0xEB, 0x5E, 0xD1, 0xC0, 0xE7, 0xD5, 0x37, 0x3D,\n-\t\t\t0x03, 0xA3, 0x16, 0x09, 0xD4, 0xDE, 0xC3, 0x97,\n-\t\t\t0x13, 0xB6, 0x67, 0x55, 0x8A, 0x71, 0x51, 0x66,\n-\t\t\t0xF5, 0xA1, 0x3B, 0xE3, 0x49, 0x8D, 0x7C, 0x52,\n-\t\t\t0xCD, 0xA7, 0x11, 0xDD, 0xE0, 0xA0, 0x5C, 0xD8,\n-\t\t\t0xF8, 0xDF, 0x01, 0xC5, 0x61, 0x87, 0xB4, 0xDE,\n-\t\t\t0x3E, 0x39, 0xED, 0xC3, 0x3F, 0x84, 0x70, 0x37,\n-\t\t\t0xBA, 0xDB, 0x5B\n-\t\t},\n-\t\t.len = 299\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0x85, 0x04, 0x13, 0x7C, 0x4D, 0xBF, 0xC6, 0x25,\n-\t\t\t0xD9, 0xAA, 0x1F, 0xED, 0x00, 0x69, 0xD7, 0x6C,\n-\t\t\t0xB0, 0x46, 0x52, 0xA5, 0xF4, 0xF6, 0x55, 0x16,\n-\t\t\t0x67, 0x52, 0x09, 0xF0, 0x28, 0xA7, 0x30, 0x22,\n-\t\t\t0x34, 0xF1, 0xEA, 0xEB, 0x7C, 0x18, 0xEE, 0xAC,\n-\t\t\t0x1A, 0xC1, 0xF5, 0x31, 0x7E, 0xA4, 0x4A, 0x0C,\n-\t\t\t0xEA, 0xFE, 0x33, 0xDB, 0x49, 0x04, 0xFD, 0x33,\n-\t\t\t0x3F, 0xB1, 0x41, 0x1F, 0xBD, 0x43, 0x71, 0xDE,\n-\t\t\t0xB9, 0xA2, 0x4F, 0x20, 0x57, 0xAF, 0x27, 0x37,\n-\t\t\t0x58, 0xA8, 0x51, 0x5D, 0x4E, 0xAB, 0x17, 0x1C,\n-\t\t\t0x99, 0xD9, 0xB2, 0x0D, 0x21, 0xCA, 0x35, 0x52,\n-\t\t\t0xF2, 0x4C, 0x7C, 0x79, 0x83, 0x2C, 0xF2, 0x87,\n-\t\t\t0xC5, 0x58, 0x6E, 0x6E, 0x48, 0xFB, 0x32, 0x4D,\n-\t\t\t0x1C, 0xDC, 0xE9, 0xDA, 0x9B, 0x77, 0x19, 0xD9,\n-\t\t\t0x78, 0xE4, 0xF5, 0x3A, 0x49, 0x3D, 0x0D, 0x3D,\n-\t\t\t0x10, 0x77, 0x0B, 0xC2, 0xE6, 0x66, 0x68, 0xFA,\n-\t\t\t0x55, 0x99, 0x65, 0x5E, 0x55, 0x87, 0xCF, 0x3C,\n-\t\t\t0x9C, 0x6C, 0x08, 0x09, 0x1F, 0x9C, 0xCB, 0x5E,\n-\t\t\t0xE5, 0x19, 0x39, 0xA9, 0x2F, 0xF0, 0x49, 0x3D,\n-\t\t\t0x7C, 0xB6, 0x7B, 0xA2, 0x93, 0xF1, 0x52, 0xD8,\n-\t\t\t0x92, 0xDD, 0x56, 0x57, 0x8E, 0xE2, 0x5F, 0xA0,\n-\t\t\t0x64, 0xB2, 0xC5, 0x0F, 0xB9, 0x89, 0xA6, 0x3F,\n-\t\t\t0x54, 0x51, 0x2D, 0x01, 0x51, 0x78, 0x32, 0xE1,\n-\t\t\t0xA7, 0x4D, 0x45, 0xC0, 0xD0, 0x6C, 0xE7, 0xCA,\n-\t\t\t0xB2, 0x3F, 0x17, 0xD4, 0xB6, 0x58, 0x9B, 0xA8,\n-\t\t\t0xBA, 0x2F, 0x3D, 0x1D, 0x6A, 0x73, 0x82, 0x2B,\n-\t\t\t0x26, 0x2E, 0x7A, 0xEE, 0xEA, 0x41, 0x25, 0xFE,\n-\t\t\t0xF0, 0xA2, 0x9C, 0x60, 0x35, 0xAD, 0x34, 0x30,\n-\t\t\t0x55, 0x02, 0x6B, 0x06, 0xF4, 0xAD, 0x91, 0xA3,\n-\t\t\t0xA2, 0x9C, 0x12, 0x8D, 0xDF, 0x2B, 0x3F, 0x0C,\n-\t\t\t0x54, 0xCB, 0x98, 0xBA, 0xA1, 0x33, 0x70, 0xEF,\n-\t\t\t0xF1, 0xEE, 0x15, 0xB7, 0xC6, 0x27, 0x47, 0x83,\n-\t\t\t0x90, 0x58, 0x08, 0x16, 0x83, 0x94, 0xE9, 0x95,\n-\t\t\t0x8B, 0x03, 0xD0, 0x3C, 0x45, 0xF8, 0x90, 0xC9,\n-\t\t\t0xA7, 0x64, 0x76, 0xE8, 0x01, 0xA4, 0xA2, 0xAD,\n-\t\t\t0x6F, 0x19, 0xCF, 0x38, 0x9A, 0xAB, 0x6E, 0xBE,\n-\t\t\t0x79, 0xE4, 0x0F, 0xCE, 0x9C, 0x59, 0xF2, 0xF4,\n-\t\t\t0x26, 0xAB, 0x0F\n-\t\t},\n-\t\t.len = 299\n-\t},\n-\t.result_len = 299\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=448, base=50, exp=40, res=448)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0x92, 0x45, 0x17, 0x7D, 0xD3, 0xF4, 0x2B, 0x93,\n-\t\t\t0x8E, 0x1A, 0xFB, 0x1D, 0x13, 0x55, 0x53, 0x84,\n-\t\t\t0x96, 0x3C, 0x39, 0xE0, 0xAF, 0x4A, 0xB4, 0xC9,\n-\t\t\t0x16, 0x1F, 0xF4, 0x24, 0x65, 0xDD, 0xC3, 0x62,\n-\t\t\t0x12, 0xAF, 0x86, 0x95, 0x0D, 0xDE, 0x28, 0x87,\n-\t\t\t0x90, 0x11, 0xAA, 0x6E, 0x60, 0xCD, 0x54, 0xB7,\n-\t\t\t0x48, 0x43\n-\t\t},\n-\t\t.len = 50\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0x22, 0xD9, 0x4D, 0x01, 0x2F, 0x50, 0x5D, 0xE1,\n-\t\t\t0x01, 0xAA, 0xC6, 0xC6, 0xCD, 0x5D, 0x7E, 0x61,\n-\t\t\t0x75, 0x0A, 0xDC, 0x06, 0x07, 0x4B, 0xBD, 0x29,\n-\t\t\t0x33, 0x09, 0x91, 0xD4, 0x29, 0xEB, 0x52, 0x24,\n-\t\t\t0x27, 0xC6, 0x83, 0x6D, 0x70, 0xA9, 0xC9, 0x11\n-\t\t},\n-\t\t.len = 40\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x6B, 0x15, 0x66, 0xD3, 0x81, 0x3E, 0xCB, 0xA6,\n-\t\t\t0xD8, 0x88, 0x9C, 0xFF, 0x8D, 0xBC, 0x91, 0x9F,\n-\t\t\t0xDA, 0x09, 0x9E, 0x1B, 0xDB, 0x8A, 0x0F, 0xAC,\n-\t\t\t0x19, 0x8E, 0xFE, 0x25, 0xA0, 0x66, 0x9D, 0x19,\n-\t\t\t0x7C, 0xCB, 0x1D, 0xCF, 0x97, 0x41, 0xD2, 0x7A,\n-\t\t\t0x0E, 0xAE, 0x8A, 0xD4, 0x24, 0x6D, 0xDF, 0xF4,\n-\t\t\t0x0A, 0xCD, 0xE7, 0xF3, 0x21, 0x76, 0x22, 0xCA,\n-\t\t\t0x31, 0x67, 0x91, 0x1B, 0x3A, 0x38, 0xAF, 0x03,\n-\t\t\t0xA6, 0xFF, 0x34, 0xA2, 0x92, 0xC8, 0x70, 0xD4,\n-\t\t\t0x86, 0xA5, 0x32, 0x57, 0xDC, 0xE5, 0xEB, 0xA5,\n-\t\t\t0x33, 0xC2, 0x83, 0xC3, 0x33, 0xE8, 0x53, 0x8F,\n-\t\t\t0x8A, 0xFA, 0xAE, 0xCF, 0x35, 0x6E, 0xD0, 0x5D,\n-\t\t\t0xCF, 0xE4, 0x18, 0x2F, 0x6E, 0xEC, 0x9D, 0xE9,\n-\t\t\t0x60, 0x27, 0xF7, 0x7A, 0xFD, 0x1D, 0xC3, 0x2C,\n-\t\t\t0xE0, 0xDA, 0x7B, 0x18, 0xE0, 0x6A, 0x06, 0xE6,\n-\t\t\t0xEE, 0xA3, 0x0C, 0x02, 0x98, 0xA5, 0x30, 0xA1,\n-\t\t\t0x3F, 0x98, 0xCA, 0x06, 0xBD, 0x76, 0xDB, 0xCC,\n-\t\t\t0xDF, 0x0B, 0x38, 0x43, 0x86, 0x11, 0xB8, 0xB7,\n-\t\t\t0xC5, 0xC1, 0x74, 0x59, 0x63, 0xFF, 0x3C, 0xFC,\n-\t\t\t0x14, 0xDF, 0xAD, 0xDD, 0x99, 0xCC, 0x48, 0xEA,\n-\t\t\t0xCE, 0x75, 0x15, 0x1D, 0x8F, 0x63, 0x5B, 0x9D,\n-\t\t\t0x97, 0x2E, 0x98, 0x7B, 0x7A, 0x07, 0xBB, 0x99,\n-\t\t\t0x57, 0xF5, 0xC4, 0x4D, 0x11, 0x4C, 0x55, 0x08,\n-\t\t\t0x5F, 0x2C, 0x25, 0x37, 0x83, 0x76, 0xD5, 0xCA,\n-\t\t\t0x51, 0x5C, 0x86, 0xA4, 0xA1, 0x14, 0x2B, 0xBA,\n-\t\t\t0xBD, 0x59, 0xBF, 0xE0, 0x41, 0xA9, 0x66, 0xD1,\n-\t\t\t0x29, 0x4B, 0x04, 0xCA, 0xEE, 0x9A, 0x31, 0x5E,\n-\t\t\t0xD9, 0x11, 0xEE, 0x1B, 0xB6, 0x09, 0x11, 0xA4,\n-\t\t\t0xD8, 0x3A, 0x12, 0xF5, 0x9E, 0x79, 0x02, 0x64,\n-\t\t\t0x8F, 0x18, 0x38, 0x5D, 0x19, 0x4D, 0x56, 0xA6,\n-\t\t\t0x7A, 0xA6, 0xC0, 0x98, 0x13, 0x2F, 0x60, 0x73,\n-\t\t\t0xD2, 0x8F, 0x70, 0x3D, 0x09, 0x42, 0xE9, 0xCC,\n-\t\t\t0xFF, 0xA9, 0xF0, 0x82, 0xA2, 0x10, 0x1A, 0x26,\n-\t\t\t0x91, 0xD6, 0x84, 0x24, 0x0A, 0x3A, 0xC6, 0x67,\n-\t\t\t0x36, 0xCE, 0x9B, 0x4B, 0xF8, 0xF3, 0xCA, 0xB6,\n-\t\t\t0x6C, 0x5F, 0x04, 0xE5, 0x74, 0xD8, 0x56, 0x42,\n-\t\t\t0x7D, 0xD1, 0x5E, 0x8F, 0xA0, 0x9D, 0x66, 0x3B,\n-\t\t\t0x13, 0x86, 0x9D, 0x84, 0x40, 0x74, 0x76, 0x00,\n-\t\t\t0xCD, 0x40, 0x87, 0x58, 0x7C, 0x41, 0x8A, 0xE2,\n-\t\t\t0xF8, 0xCB, 0x06, 0xCF, 0xCB, 0x0C, 0x78, 0x5D,\n-\t\t\t0x6E, 0xAD, 0xE0, 0x1A, 0x54, 0xC3, 0x31, 0x5B,\n-\t\t\t0xCF, 0xD0, 0x2D, 0x22, 0xA5, 0x84, 0x97, 0x20,\n-\t\t\t0x4D, 0x13, 0x5F, 0xED, 0xFE, 0x01, 0xD8, 0x1A,\n-\t\t\t0x79, 0xB5, 0x99, 0x03, 0x18, 0x55, 0xFB, 0xDD,\n-\t\t\t0x5F, 0x6E, 0x85, 0xA2, 0x13, 0x28, 0x45, 0x29,\n-\t\t\t0x25, 0x71, 0xC8, 0x53, 0x9B, 0x45, 0xA5, 0xD9,\n-\t\t\t0x55, 0x8C, 0xC8, 0x93, 0x2B, 0xBC, 0x08, 0x8D,\n-\t\t\t0x47, 0x90, 0x8F, 0x5E, 0x4B, 0xBC, 0xCE, 0xD1,\n-\t\t\t0x51, 0x3B, 0xFB, 0x09, 0x4A, 0x72, 0x99, 0x0F,\n-\t\t\t0xE2, 0x5F, 0x80, 0xF4, 0xE7, 0x6F, 0xD6, 0x08,\n-\t\t\t0xD1, 0x79, 0xE8, 0x68, 0xFA, 0x29, 0x08, 0x4F,\n-\t\t\t0x8B, 0x11, 0x12, 0x27, 0x97, 0x04, 0xC8, 0x7D,\n-\t\t\t0xAB, 0x4D, 0xDA, 0x92, 0x29, 0x42, 0x7C, 0x3E,\n-\t\t\t0x7D, 0x05, 0xEC, 0x1F, 0x4A, 0xA1, 0xBB, 0x3F,\n-\t\t\t0x77, 0x3F, 0xEF, 0xC9, 0xAA, 0x63, 0xD5, 0x39,\n-\t\t\t0xD5, 0x33, 0x0D, 0x28, 0xD0, 0x3C, 0x85, 0xC0\n-\t\t},\n-\t\t.len = 448\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0xBB, 0x97, 0x8A, 0xB6, 0x26, 0xD4, 0x0E, 0x70,\n-\t\t\t0x21, 0xA6, 0x56, 0x71, 0xE5, 0xD8, 0x18, 0x21,\n-\t\t\t0x64, 0x9F, 0x1B, 0x6F, 0x7C, 0x27, 0x72, 0xB8,\n-\t\t\t0x39, 0xE5, 0x2A, 0x94, 0x76, 0x22, 0xB7, 0x68,\n-\t\t\t0x57, 0x3A, 0x01, 0x54, 0xA8, 0x50, 0x41, 0xA1,\n-\t\t\t0xAD, 0xD0, 0xC7, 0xDB, 0xAA, 0x76, 0x7F, 0x37,\n-\t\t\t0xA9, 0x27, 0x22, 0x8D, 0xF0, 0x5C, 0x5A, 0xAC,\n-\t\t\t0xFB, 0x82, 0x6A, 0x8E, 0x31, 0x51, 0x54, 0x7C,\n-\t\t\t0xDB, 0x55, 0x9C, 0xBC, 0x82, 0x27, 0xF4, 0x0B,\n-\t\t\t0x94, 0x74, 0xC8, 0x83, 0x80, 0x1C, 0xD8, 0xFF,\n-\t\t\t0x50, 0xA2, 0xC9, 0xED, 0x2B, 0x98, 0x77, 0xF3,\n-\t\t\t0x31, 0x81, 0x1C, 0x41, 0x8E, 0xAF, 0x87, 0xA2,\n-\t\t\t0x02, 0xAC, 0x8B, 0x55, 0x01, 0x5C, 0x16, 0x11,\n-\t\t\t0x63, 0x8C, 0xE2, 0x0D, 0x51, 0xD2, 0x4C, 0xD7,\n-\t\t\t0xD4, 0x3D, 0xE4, 0x79, 0x1A, 0xA7, 0xC4, 0xBF,\n-\t\t\t0x4E, 0x2A, 0xC9, 0x74, 0xD6, 0xD4, 0x90, 0x03,\n-\t\t\t0x65, 0x7F, 0x54, 0x0F, 0xAC, 0x5F, 0x98, 0x2C,\n-\t\t\t0x46, 0xC0, 0xD7, 0xE6, 0x75, 0x95, 0xC3, 0xEA,\n-\t\t\t0x05, 0x3A, 0x03, 0x55, 0x43, 0xC7, 0xC2, 0xD1,\n-\t\t\t0x11, 0xCD, 0x57, 0x37, 0x0D, 0x40, 0x87, 0xDF,\n-\t\t\t0x7D, 0xC3, 0x04, 0x54, 0xDE, 0x1D, 0xAF, 0xB8,\n-\t\t\t0x02, 0x50, 0x42, 0xFF, 0x9D, 0xFB, 0x13, 0xF7,\n-\t\t\t0x25, 0x5A, 0x8B, 0xE3, 0x31, 0xA2, 0x64, 0xF8,\n-\t\t\t0x94, 0x50, 0x18, 0xFB, 0xBB, 0xA2, 0xE9, 0x13,\n-\t\t\t0x77, 0x6E, 0xE1, 0x6F, 0x9F, 0x06, 0x03, 0xEE,\n-\t\t\t0x0D, 0x06, 0x6E, 0xF2, 0x9B, 0x15, 0x70, 0xDD,\n-\t\t\t0x26, 0x7C, 0xB4, 0x5D, 0xD0, 0xE7, 0x77, 0xC4,\n-\t\t\t0xB9, 0x88, 0x75, 0xB8, 0x73, 0xFC, 0xE9, 0xB7,\n-\t\t\t0x11, 0x26, 0xAC, 0xDB, 0x97, 0x27, 0x18, 0x21,\n-\t\t\t0x50, 0x7E, 0x46, 0xB2, 0xF1, 0x50, 0x40, 0xD9,\n-\t\t\t0x8B, 0x63, 0xDB, 0x1A, 0x8E, 0x29, 0xBE, 0x1F,\n-\t\t\t0x88, 0x35, 0xFD, 0x95, 0xC3, 0xA6, 0x80, 0xEB,\n-\t\t\t0x73, 0xF7, 0x02, 0x02, 0xB0, 0xCA, 0x97, 0x2C,\n-\t\t\t0x32, 0x44, 0xA9, 0xCA, 0x94, 0xC0, 0xB2, 0xD9,\n-\t\t\t0x7C, 0xD9, 0x10, 0x62, 0x31, 0xC9, 0xFA, 0x5B,\n-\t\t\t0x5C, 0x2C, 0xB6, 0x04, 0x5B, 0x7E, 0x86, 0xBB,\n-\t\t\t0x49, 0x02, 0x16, 0x9E, 0x1E, 0x53, 0xBD, 0xC2,\n-\t\t\t0xA9, 0xAA, 0x94, 0x39, 0xA1, 0xB2, 0x18, 0x17,\n-\t\t\t0xB6, 0x2C, 0xF6, 0xFF, 0xC0, 0xD0, 0x2D, 0x4D,\n-\t\t\t0xAA, 0x6C, 0xB5, 0xC8, 0x6A, 0xBE, 0x38, 0xE4,\n-\t\t\t0x9F, 0xDC, 0x5C, 0x56, 0x56, 0x04, 0x32, 0x49,\n-\t\t\t0x91, 0x17, 0x44, 0x6E, 0xB3, 0xF9, 0x8F, 0xDB,\n-\t\t\t0xEA, 0x04, 0x4C, 0x67, 0xE6, 0xDA, 0x96, 0x2F,\n-\t\t\t0x89, 0x2D, 0x54, 0xC3, 0xAD, 0x07, 0x6B, 0xA0,\n-\t\t\t0x87, 0xF0, 0xCF, 0x4B, 0x43, 0x46, 0xCA, 0x06,\n-\t\t\t0x48, 0x8D, 0x34, 0xC4, 0xD2, 0xD2, 0xA9, 0x16,\n-\t\t\t0x13, 0xF5, 0x49, 0x44, 0x8C, 0xD9, 0x0C, 0x1E,\n-\t\t\t0x79, 0x47, 0xFC, 0x4C, 0x37, 0x8E, 0xD1, 0xFD,\n-\t\t\t0xB9, 0xE8, 0x6E, 0x1B, 0x8D, 0x68, 0xCC, 0x49,\n-\t\t\t0x0D, 0x98, 0xB5, 0xD5, 0x22, 0x1C, 0xFC, 0xBA,\n-\t\t\t0x7A, 0x74, 0x3D, 0xBD, 0xD9, 0xB3, 0x80, 0x58,\n-\t\t\t0x4A, 0x05, 0x67, 0x9D, 0x59, 0xF4, 0xF7, 0x72,\n-\t\t\t0x11, 0x3C, 0x67, 0x96, 0xE7, 0x0D, 0x8E, 0x73,\n-\t\t\t0xD1, 0xEE, 0x00, 0x79, 0x98, 0x7A, 0x0E, 0xE0,\n-\t\t\t0xA8, 0xEA, 0x7D, 0xF3, 0xDB, 0x0E, 0x62, 0x3E,\n-\t\t\t0x66, 0x95, 0xED, 0xD5, 0x8C, 0x39, 0xF5, 0xAB\n-\t\t},\n-\t\t.len = 448\n-\t},\n-\t.result_len = 448\n-},\n-{\n-\t.description = \"Modular Exponentiation \"\n-\t\t\t\t   \"(mod=19, base=500, exp=35, res=19)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0x42, 0xE5, 0x6F, 0xF7, 0xEF, 0x8F, 0xAB, 0x6F,\n-\t\t\t0xF5, 0xE2, 0xD2, 0x97, 0x68, 0x0D, 0x52, 0xDD,\n-\t\t\t0x3D, 0x62, 0xC4, 0xC4, 0xDE, 0xD2, 0x07, 0x50,\n-\t\t\t0x1B, 0xA9, 0x5F, 0xAE, 0x42, 0xCB, 0x5E, 0x0B,\n-\t\t\t0xC0, 0x41, 0xFE, 0xEF, 0x22, 0xA6, 0x4E, 0x35,\n-\t\t\t0x80, 0x61, 0x22, 0x92, 0x65, 0x77, 0x45, 0x84,\n-\t\t\t0x6C, 0x03, 0x7C, 0xEF, 0xC0, 0x49, 0x31, 0x87,\n-\t\t\t0x86, 0x9B, 0x2E, 0x28, 0xA1, 0x55, 0x2D, 0x3C,\n-\t\t\t0x68, 0x3D, 0x69, 0x0E, 0x98, 0xD6, 0x40, 0xFD,\n-\t\t\t0x0B, 0x4C, 0x5F, 0xC7, 0x95, 0xF1, 0x53, 0x7C,\n-\t\t\t0xCC, 0x12, 0x3F, 0x8C, 0x7A, 0x24, 0x73, 0xE7,\n-\t\t\t0x33, 0x20, 0xBD, 0x0C, 0xD2, 0x9C, 0x12, 0x20,\n-\t\t\t0xC0, 0xC0, 0xA9, 0x16, 0x7E, 0x6B, 0x1D, 0x1F,\n-\t\t\t0xFE, 0x63, 0x8A, 0x22, 0x75, 0xDC, 0xF0, 0x0F,\n-\t\t\t0x8E, 0xA4, 0x3C, 0xE3, 0x6B, 0xFA, 0x46, 0xBA,\n-\t\t\t0xEB, 0x91, 0x31, 0x9D, 0x34, 0xED, 0xA0, 0xA6,\n-\t\t\t0xA3, 0xAB, 0xA5, 0x2A, 0x10, 0x30, 0xF4, 0x6F,\n-\t\t\t0x80, 0x25, 0xB0, 0xF5, 0x56, 0x76, 0xD3, 0xC5,\n-\t\t\t0x10, 0x92, 0xCD, 0xEA, 0xC3, 0x9C, 0x52, 0x96,\n-\t\t\t0xF1, 0xBD, 0x42, 0x53, 0xF3, 0xA9, 0x1F, 0xCB,\n-\t\t\t0x53, 0x45, 0xF1, 0xF6, 0x5F, 0x98, 0xFC, 0x13,\n-\t\t\t0xC9, 0xA8, 0x44, 0xC6, 0xD0, 0x78, 0xB6, 0x39,\n-\t\t\t0x93, 0x02, 0xC6, 0xC9, 0x0F, 0xAF, 0xF9, 0x6D,\n-\t\t\t0x91, 0x35, 0xC9, 0x26, 0x73, 0x11, 0xEB, 0xEE,\n-\t\t\t0x52, 0x61, 0x6C, 0xC0, 0x7F, 0xFD, 0xD0, 0x77,\n-\t\t\t0x9F, 0xC6, 0x0A, 0x05, 0x1B, 0x90, 0x61, 0x54,\n-\t\t\t0x61, 0xFF, 0x1E, 0xBA, 0x1D, 0x2F, 0x25, 0xE9,\n-\t\t\t0x85, 0x4C, 0xBA, 0xEF, 0x99, 0x95, 0x3C, 0xBB,\n-\t\t\t0xA9, 0xCF, 0x0D, 0xBF, 0x2C, 0x86, 0xB0, 0x59,\n-\t\t\t0xAA, 0x83, 0x29, 0x32, 0x24, 0x28, 0xC8, 0x53,\n-\t\t\t0x28, 0x4C, 0xEB, 0x08, 0xFF, 0xC6, 0x25, 0xB7,\n-\t\t\t0xFF, 0x18, 0xB0, 0x2C, 0xDD, 0xAE, 0xFB, 0xDB,\n-\t\t\t0x54, 0xA2, 0x92, 0x27, 0x15, 0x0D, 0x6B, 0x50,\n-\t\t\t0xFB, 0xEA, 0x2C, 0x1C, 0x6F, 0x91, 0x3C, 0x50,\n-\t\t\t0x5A, 0xD8, 0x9B, 0x33, 0xED, 0x51, 0x5D, 0x7C,\n-\t\t\t0x37, 0x01, 0xEF, 0x09, 0xEA, 0x59, 0x56, 0x8A,\n-\t\t\t0x67, 0x21, 0x8C, 0x25, 0x00, 0x33, 0x24, 0x31,\n-\t\t\t0xCB, 0xAA, 0x5A, 0xA4, 0xB1, 0x84, 0xDD, 0x89,\n-\t\t\t0x3A, 0xFA, 0xD8, 0xAB, 0xEE, 0x3E, 0xC0, 0x0D,\n-\t\t\t0xDA, 0x2C, 0x2A, 0x75, 0x13, 0xD7, 0x49, 0x5E,\n-\t\t\t0x28, 0x2C, 0x24, 0xC6, 0x1E, 0xA0, 0xB3, 0x70,\n-\t\t\t0xAD, 0x45, 0x8A, 0xF2, 0xD9, 0x38, 0x69, 0xD5,\n-\t\t\t0x53, 0x30, 0xD8, 0x09, 0x09, 0xDE, 0x1F, 0x6C,\n-\t\t\t0x36, 0x82, 0xD5, 0xEC, 0xA7, 0x7E, 0x37, 0x5F,\n-\t\t\t0x7D, 0xF2, 0x85, 0x85, 0xF9, 0x0A, 0xC1, 0x13,\n-\t\t\t0x86, 0x3C, 0xCD, 0xFE, 0x44, 0x46, 0x57, 0x5E,\n-\t\t\t0x67, 0x39, 0x9D, 0x65, 0x74, 0xB9, 0x13, 0x5A,\n-\t\t\t0x05, 0xC1, 0xEA, 0xB5, 0x10, 0x1D, 0x66, 0xFF,\n-\t\t\t0xA0, 0x3D, 0x47, 0x27, 0x15, 0x66, 0x52, 0x19,\n-\t\t\t0xFA, 0x95, 0xD0, 0x03, 0x67, 0xA8, 0x89, 0xAA,\n-\t\t\t0x68, 0x04, 0x5F, 0xC4, 0x57, 0x1F, 0x6C, 0xF7,\n-\t\t\t0xD2, 0xE2, 0xA3, 0xF3, 0x96, 0x70, 0x86, 0xC6,\n-\t\t\t0xCB, 0x3D, 0x52, 0x66, 0x79, 0xED, 0xE6, 0x35,\n-\t\t\t0x0A, 0xE8, 0xA8, 0x5A, 0xED, 0x41, 0xB0, 0xF0,\n-\t\t\t0x89, 0xCC, 0x20, 0xDA, 0xB7, 0x48, 0x44, 0x64,\n-\t\t\t0x69, 0xC9, 0x43, 0xE2, 0xBD, 0xD1, 0x17, 0xCF,\n-\t\t\t0x25, 0x7C, 0x92, 0x0B, 0xFC, 0x71, 0x46, 0x67,\n-\t\t\t0x1F, 0xF4, 0xA7, 0xFF, 0xD8, 0xA4, 0x5F, 0x4A,\n-\t\t\t0x8A, 0x45, 0xBE, 0xDD, 0x89, 0xE2, 0x2A, 0xA7,\n-\t\t\t0xBC, 0xE9, 0x84, 0x53, 0x9D, 0xF4, 0x39, 0xB7,\n-\t\t\t0xDB, 0x3A, 0x17, 0xF7, 0x27, 0x39, 0xDF, 0x8A,\n-\t\t\t0xF0, 0x72, 0xD6, 0x23, 0x1B, 0x1C, 0xD9, 0x48,\n-\t\t\t0xF4, 0x2E, 0x54, 0xA3\n-\t\t},\n-\t\t.len = 500\n-\t},\n-\t.exponent = {\n-\t\t.data = {\n-\t\t\t0xE7, 0xF1, 0x97, 0x29, 0x62, 0x0B, 0x99, 0x89,\n-\t\t\t0x99, 0xC1, 0x63, 0xA2, 0xB7, 0x29, 0xAD, 0x0E,\n-\t\t\t0x84, 0x3B, 0x86, 0x82, 0xC4, 0xDD, 0xC4, 0xE2,\n-\t\t\t0xA7, 0xD4, 0xBA, 0x91, 0x2C, 0xB5, 0xD6, 0xD4,\n-\t\t\t0x74, 0x1D, 0xE1\n-\t\t},\n-\t\t.len = 35\n-\t},\n-\t.reminder = {\n-\t\t.data = {\n-\t\t\t0x67, 0x9F, 0xF7, 0x57, 0xD7, 0xF8, 0xF8, 0x90,\n-\t\t\t0x4E, 0xB5, 0x34, 0xE8, 0xAF, 0x14, 0xC6, 0x94,\n-\t\t\t0x5F, 0xA1, 0x03\n-\t\t},\n-\t\t.len = 19\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0x9C, 0xE7, 0xE7, 0x14, 0x6E, 0x07, 0x71, 0xD2,\n-\t\t\t0xD1, 0xB3, 0x59, 0x9B, 0x63, 0xDB, 0x58, 0x8D,\n-\t\t\t0x5E, 0x84, 0xA0\n-\t\t},\n-\t\t.len = 19\n-\t},\n-\t.result_len = 19\n-}\n-};\n-\n-static const struct\n-modinv_test_data modinv_test_case[] = {\n-{\n-\t.description = \"Modular Inverse (mod=128, base=20, exp=3, inv=128)\",\n-\t.xform_type = RTE_CRYPTO_ASYM_XFORM_MODINV,\n-\t.base = {\n-\t\t.data = {\n-\t\t\t0xF8, 0xBA, 0x1A, 0x55, 0xD0, 0x2F, 0x85,\n-\t\t\t0xAE, 0x96, 0x7B, 0xB6, 0x2F, 0xB6, 0xCD,\n-\t\t\t0xA8, 0xEB, 0x7E, 0x78, 0xA0, 0x50\n-\t\t},\n-\t\t.len = 20\n-\t},\n-\t.inverse = {\n-\t\t.data = {\n-\t\t\t0x52, 0xb1, 0xa3, 0x8c, 0xc5, 0x8a, 0xb9, 0x1f,\n-\t\t\t0xb6, 0x82, 0xf5, 0x6a, 0x9a, 0xde, 0x8d, 0x2e,\n-\t\t\t0x62, 0x4b, 0xac, 0x49, 0x21, 0x1d, 0x30, 0x4d,\n-\t\t\t0x32, 0xac, 0x1f, 0x40, 0x6d, 0x52, 0xc7, 0x9b,\n-\t\t\t0x6c, 0x0a, 0x82, 0x3a, 0x2c, 0xaf, 0x6b, 0x6d,\n-\t\t\t0x17, 0xbe, 0x43, 0xed, 0x97, 0x78, 0xeb, 0x4c,\n-\t\t\t0x92, 0x6f, 0xcf, 0xed, 0xb1, 0x09, 0xcb, 0x27,\n-\t\t\t0xc2, 0xde, 0x62, 0xfd, 0x21, 0xe6, 0xbd, 0x4f,\n-\t\t\t0xfe, 0x7a, 0x1b, 0x50, 0xfe, 0x10, 0x4a, 0xb0,\n-\t\t\t0xb7, 0xcf, 0xdb, 0x7d, 0xca, 0xc2, 0xf0, 0x1c,\n-\t\t\t0x39, 0x48, 0x6a, 0xb5, 0x4d, 0x8c, 0xfe, 0x63,\n-\t\t\t0x91, 0x9c, 0x21, 0xc3, 0x0e, 0x76, 0xad, 0x44,\n-\t\t\t0x8d, 0x54, 0x33, 0x99, 0xe1, 0x80, 0x19, 0xba,\n-\t\t\t0xb5, 0xac, 0x7d, 0x9c, 0xce, 0x91, 0x2a, 0xd9,\n-\t\t\t0x2c, 0xe1, 0x16, 0xd6, 0xd7, 0xcf, 0x9d, 0x05,\n-\t\t\t0x9a, 0x66, 0x9a, 0x3a, 0xc1, 0xb8, 0x4b, 0xc3\n-\t\t},\n-\t\t.len = 128\n-\t},\n-\t.modulus = {\n-\t\t.data = {\n-\t\t\t0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00, 0x0a,\n-\t\t\t0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5, 0xce,\n-\t\t\t0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a, 0xa2,\n-\t\t\t0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde, 0x0a,\n-\t\t\t0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a, 0x3d,\n-\t\t\t0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63, 0x6a,\n-\t\t\t0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27, 0x6e,\n-\t\t\t0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa, 0x72,\n-\t\t\t0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53, 0x87,\n-\t\t\t0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a, 0x62,\n-\t\t\t0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63, 0x18,\n-\t\t\t0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33, 0x4e,\n-\t\t\t0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3, 0x03,\n-\t\t\t0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e, 0xee,\n-\t\t\t0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb, 0xa6,\n-\t\t\t0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde, 0x55\n-\t\t},\n-\t\t.len = 128\n-\t},\n-\t.result_len = 128\n-}\n-};\n-\n /* modular operation test data */\n uint8_t base[] = {\n \t0xF8, 0xBA, 0x1A, 0x55, 0xD0, 0x2F, 0x85,\ndiff --git a/app/test/test_cryptodev_rsa_test_vectors.h b/app/test/test_cryptodev_rsa_test_vectors.h\nindex 04539a1ecf..77a52d259b 100644\n--- a/app/test/test_cryptodev_rsa_test_vectors.h\n+++ b/app/test/test_cryptodev_rsa_test_vectors.h\n@@ -11,230 +11,6 @@\n \n #define TEST_DATA_SIZE 4096\n \n-struct rsa_test_data_2 {\n-\tenum rte_crypto_asym_xform_type xform_type;\n-\tconst char *description;\n-\tuint64_t op_type_flags;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} pt;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} ct;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} sign;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} e;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} d;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} n;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} p;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} q;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} dP;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} dQ;\n-\tstruct {\n-\t\tuint8_t data[DATA_SIZE];\n-\t\tuint16_t len;\n-\t} qInv;\n-\n-\tuint16_t result_len;\n-\tenum rte_crypto_rsa_padding_type padding;\n-\tint key_exp;\n-\tint key_qt;\n-};\n-\n-static const struct\n-rsa_test_data_2 rsa_test_case_list[] = {\n-\t{\n-\t\t.description = \"RSA Encryption Decryption \"\n-\t\t\t\t\t   \"(n=128, pt=20, e=3) EXP, QT\",\n-\t\t.xform_type = RTE_CRYPTO_ASYM_XFORM_RSA,\n-\t\t.op_type_flags = 1UL << RTE_CRYPTO_ASYM_OP_ENCRYPT |\n-\t\t\t\t\t1UL << RTE_CRYPTO_ASYM_OP_DECRYPT,\n-\t\t.pt = {\n-\t\t\t.data = {\n-\t\t\t\t0x00, 0x02, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,\n-\t\t\t\t0xbb, 0xbb, 0xbb, 0xbb, 0xf8, 0xba, 0x1a, 0x55,\n-\t\t\t\t0xd0, 0x2f, 0x85, 0xae,\t0x96, 0x7b, 0xb6, 0x2f,\n-\t\t\t\t0xb6, 0xcd, 0xa8, 0xeb,\t0x7e, 0x78, 0xa0, 0x50\n-\t\t\t},\n-\t\t\t.len = 128,\n-\t\t},\n-\t\t.ct = {\n-\t\t\t.data = {\n-\t\t\t\t0x3D, 0x8D, 0x2F, 0x85, 0xC0, 0xB7, 0x21, 0x3E,\n-\t\t\t\t0x5B, 0x4A, 0x96, 0xB2, 0x85, 0x35, 0xAF, 0x0C,\n-\t\t\t\t0x62, 0xE9, 0x73, 0xEF, 0x77, 0x76, 0x19, 0xD5,\n-\t\t\t\t0x92, 0xF7, 0x1D, 0xB0, 0x15, 0x69, 0x65, 0x82,\n-\t\t\t\t0x32, 0x30, 0x4E, 0x29, 0xE7, 0x83, 0xAD, 0x23,\n-\t\t\t\t0x66, 0xD9, 0x91, 0x9B, 0xFF, 0x01, 0x10, 0x3B,\n-\t\t\t\t0xB2, 0xF8, 0x78, 0x14, 0xD2, 0x6E, 0x3C, 0x59,\n-\t\t\t\t0x6E, 0x1A, 0x90, 0x3C, 0x5A, 0xB3, 0x0B, 0x60,\n-\t\t\t\t0xE2, 0x71, 0xCC, 0xF5, 0x0C, 0x57, 0x19, 0x03,\n-\t\t\t\t0x5B, 0x04, 0x46, 0x7E, 0x13, 0x5B, 0xFF, 0x2C,\n-\t\t\t\t0x01, 0x19, 0x75, 0x86, 0x6A, 0xAE, 0x60, 0xFB,\n-\t\t\t\t0x0A, 0x4C, 0x14, 0x1A, 0xBC, 0x0E, 0x86, 0xF1,\n-\t\t\t\t0x13, 0x10, 0xB3, 0x03, 0x8E, 0x66, 0x6F, 0xA5,\n-\t\t\t\t0x53, 0x80, 0x5A, 0x91, 0xE6, 0x7C, 0x3C, 0x38,\n-\t\t\t\t0x15, 0xB6, 0x69, 0x3E, 0xF6, 0x54, 0xB0, 0x60,\n-\t\t\t\t0x83, 0xE9, 0x2B, 0xF3, 0x26, 0x53, 0x3E, 0x11\n-\t\t\t},\n-\t\t\t.len = 128,\n-\t\t},\n-\t\t.e = {\n-\t\t\t.data = {\n-\t\t\t\t0x01, 0x00, 0x01\n-\t\t\t},\n-\t\t\t.len = 3,\n-\t\t},\n-\t\t.d = {\n-\t\t\t.data = {\n-\t\t\t\t0x24, 0xd7, 0xea, 0xf4, 0x7f, 0xe0, 0xca, 0x31,\n-\t\t\t\t0x4d, 0xee, 0xc4, 0xa1, 0xbe, 0xab, 0x06, 0x61,\n-\t\t\t\t0x32, 0xe7, 0x51, 0x46, 0x27, 0xdf, 0x72, 0xe9,\n-\t\t\t\t0x6f, 0xa8, 0x4c, 0xd1, 0x26, 0xef, 0x65, 0xeb,\n-\t\t\t\t0x67, 0xff, 0x5f, 0xa7, 0x3b, 0x25, 0xb9, 0x08,\n-\t\t\t\t0x8e, 0xa0, 0x47, 0x56, 0xe6, 0x8e, 0xf9, 0xd3,\n-\t\t\t\t0x18, 0x06, 0x3d, 0xc6, 0xb1, 0xf8, 0xdc, 0x1b,\n-\t\t\t\t0x8d, 0xe5, 0x30, 0x54, 0x26, 0xac, 0x16, 0x3b,\n-\t\t\t\t0x7b, 0xad, 0x46, 0x9e, 0x21, 0x6a, 0x57, 0xe6,\n-\t\t\t\t0x81, 0x56, 0x1d, 0x2a, 0xc4, 0x39, 0x63, 0x67,\n-\t\t\t\t0x81, 0x2c, 0xca, 0xcc, 0xf8, 0x42, 0x04, 0xbe,\n-\t\t\t\t0xcf, 0x8f, 0x6c, 0x5b, 0x81, 0x46, 0xb9, 0xc7,\n-\t\t\t\t0x62, 0x90, 0x87, 0x35, 0x03, 0x9b, 0x89, 0xcb,\n-\t\t\t\t0x37, 0xbd, 0xf1, 0x1b, 0x99, 0xa1, 0x9a, 0x78,\n-\t\t\t\t0xd5, 0x4c, 0xdd, 0x3f, 0x41, 0x0c, 0xb7, 0x1a,\n-\t\t\t\t0xd9, 0x7b, 0x87, 0x5f, 0xbe, 0xb1, 0x83, 0x41\n-\t\t\t},\n-\t\t\t.len = 128,\n-\t\t},\n-\t\t.n = {\n-\t\t\t.data = {\n-\t\t\t\t0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00, 0x0a,\n-\t\t\t\t0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5, 0xce,\n-\t\t\t\t0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a, 0xa2,\n-\t\t\t\t0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde, 0x0a,\n-\t\t\t\t0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a, 0x3d,\n-\t\t\t\t0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63, 0x6a,\n-\t\t\t\t0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27, 0x6e,\n-\t\t\t\t0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa, 0x72,\n-\t\t\t\t0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53, 0x87,\n-\t\t\t\t0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a, 0x62,\n-\t\t\t\t0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63, 0x18,\n-\t\t\t\t0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33, 0x4e,\n-\t\t\t\t0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3, 0x03,\n-\t\t\t\t0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e, 0xee,\n-\t\t\t\t0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb, 0xa6,\n-\t\t\t\t0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde, 0x55\n-\t\t\t},\n-\t\t\t.len = 128,\n-\t\t},\n-\t\t.p = {\n-\t\t\t.data = {\n-\t\t\t\t0xdc, 0xba, 0x00, 0x01, 0x57, 0x93, 0xe3, 0x05,\n-\t\t\t\t0xed, 0x61, 0x9a, 0xa3, 0xaf, 0x6a, 0xd3, 0x47,\n-\t\t\t\t0x8f, 0x2d, 0x1e, 0x7f, 0x4d, 0x60, 0xc8, 0x8d,\n-\t\t\t\t0x34, 0xb8, 0x17, 0x84, 0xbc, 0xd4, 0xe9, 0x79,\n-\t\t\t\t0x95, 0x75, 0x19, 0x37, 0xe0, 0xcc, 0xfe, 0x4c,\n-\t\t\t\t0x5d, 0x49, 0x53, 0x61, 0x29, 0xf1, 0xdc, 0x82,\n-\t\t\t\t0x03, 0x96, 0x7d, 0x95, 0x4f, 0xdd, 0x3c, 0x0a,\n-\t\t\t\t0x64, 0x8a, 0x43, 0x2f, 0x95, 0x4a, 0xed, 0xdd\n-\t\t\t},\n-\t\t\t.len = 64,\n-\t\t},\n-\t\t.q = {\n-\t\t\t.data = {\n-\t\t\t\t0xd0, 0x56, 0x7a, 0x0a, 0xd5, 0x95, 0xa4, 0x85,\n-\t\t\t\t0x53, 0x35, 0xa1, 0x48, 0x07, 0x6a, 0x7c, 0x08,\n-\t\t\t\t0xe0, 0xfd, 0x4b, 0x88, 0x77, 0xa6, 0x15, 0x23,\n-\t\t\t\t0x0f, 0xbf, 0x14, 0x46, 0x11, 0xee, 0x95, 0xc7,\n-\t\t\t\t0x5e, 0x77, 0x65, 0xa2, 0xb5, 0x50, 0xdf, 0x19,\n-\t\t\t\t0x07, 0xc7, 0x72, 0xdb, 0x29, 0xf6, 0x54, 0x86,\n-\t\t\t\t0xe1, 0xb3, 0x97, 0x0a, 0x28, 0x64, 0x3a, 0x38,\n-\t\t\t\t0xa6, 0x7d, 0x13, 0xc3, 0x79, 0xaa, 0x56, 0xd9\n-\t\t\t},\n-\t\t\t.len = 64,\n-\t\t},\n-\t\t.dP = {\n-\t\t\t.data = {\n-\t\t\t\t0xc5, 0x43, 0x0d, 0x82, 0x25, 0x8c, 0xab, 0x55,\n-\t\t\t\t0xbe, 0xc2, 0x7d, 0xfb, 0x4f, 0x68, 0x3f, 0x0e,\n-\t\t\t\t0x32, 0xec, 0xf5, 0xd6, 0x7b, 0x86, 0xc5, 0x75,\n-\t\t\t\t0x3c, 0xea, 0x51, 0x4a, 0x75, 0xa0, 0x2a, 0x50,\n-\t\t\t\t0x58, 0xbb, 0xe0, 0x1f, 0xca, 0x2e, 0x2a, 0x0e,\n-\t\t\t\t0x81, 0x48, 0x68, 0xd5, 0xeb, 0x30, 0x96, 0x0b,\n-\t\t\t\t0x33, 0xbd, 0xa8, 0xda, 0x6a, 0x17, 0xa3, 0xf2,\n-\t\t\t\t0xfd, 0xcb, 0x7b, 0x23, 0xe9, 0x5e, 0x9f, 0x99\n-\t\t\t},\n-\t\t\t.len = 64,\n-\t\t},\n-\t\t.dQ = {\n-\t\t\t.data = {\n-\t\t\t\t0xbe, 0xff, 0xf9, 0x05, 0x43, 0xc8, 0xdc, 0x3b,\n-\t\t\t\t0x0b, 0x0d, 0x28, 0xde, 0x73, 0x46, 0x11, 0x8e,\n-\t\t\t\t0xc6, 0x4e, 0x11, 0xd8, 0x7b, 0xf0, 0xfc, 0x81,\n-\t\t\t\t0xd7, 0x66, 0xd3, 0xbc, 0x65, 0xa6, 0x39, 0x14,\n-\t\t\t\t0xbd, 0xab, 0x72, 0xb7, 0x57, 0xc9, 0x5b, 0xaf,\n-\t\t\t\t0x83, 0xed, 0x3b, 0x84, 0x68, 0x15, 0x18, 0x6b,\n-\t\t\t\t0x4c, 0x32, 0xac, 0x6f, 0x38, 0x96, 0xa2, 0xb5,\n-\t\t\t\t0xdb, 0x14, 0xe2, 0x70, 0x9c, 0x73, 0x29, 0x09\n-\t\t\t},\n-\t\t\t.len = 64,\n-\t\t},\n-\t\t.qInv = {\n-\t\t\t.data = {\n-\t\t\t\t0x59, 0xbd, 0xb1, 0x37, 0xeb, 0x4e, 0xcf, 0x68,\n-\t\t\t\t0xe7, 0x85, 0x91, 0xbb, 0xc0, 0xdb, 0x8e, 0x41,\n-\t\t\t\t0x91, 0x4a, 0xc0, 0xb1, 0xc5, 0xe8, 0x91, 0xf6,\n-\t\t\t\t0xc7, 0x5a, 0x98, 0x1a, 0x8a, 0x0f, 0x45, 0xb2,\n-\t\t\t\t0x5b, 0xff, 0x7a, 0x2d, 0x98, 0x89, 0x55, 0xd9,\n-\t\t\t\t0xbf, 0x6e, 0xdd, 0x2d, 0xd4, 0xe8, 0x0a, 0xaa,\n-\t\t\t\t0xae, 0x2a, 0xc4, 0x16, 0xb5, 0xba, 0xe1, 0x69,\n-\t\t\t\t0x71, 0x94, 0xdd, 0xa0, 0xf5, 0x1e, 0x6d, 0xcc\n-\t\t\t},\n-\t\t\t.len = 64,\n-\t\t},\n-\t\t.padding = RTE_CRYPTO_RSA_PADDING_NONE,\n-\t\t.key_exp = 1,\n-\t\t.key_qt = 1,\n-\t}\n-};\n-\n struct rsa_test_data {\n \tuint8_t data[TEST_DATA_SIZE];\n \tunsigned int len;\n",
    "prefixes": [
        "v4",
        "1/3"
    ]
}