From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 64860A0353; Tue, 1 Mar 2022 16:14:31 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id ED38B40DF6; Tue, 1 Mar 2022 16:14:30 +0100 (CET) Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by mails.dpdk.org (Postfix) with ESMTP id 565B44067B for ; Tue, 1 Mar 2022 16:14:28 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1646147669; x=1677683669; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=sa9K60X2mDyy33QJqJEBhq06r65/6cZjgK+woWh6sKM=; b=NDgCRqdQZfQ7MmGIzfJmAYw4e/uDcWrUMAvzyg1OK+CZZgjGa9IF7xLI rneJegco13dZce5u9sZ3+GCz5Men8h3Te7N1nZamDmYNXAx4bD0Q8PJXB oPWVSRxbLqHpq51a+LWDf2sgtME43ovchGwI541YG3FP+JyzQIORUcyz/ hdDAgN590+lty8mSftkFMZ6B8UF5e3Kr83TCrxMqeiVnHAEa4RXDRUTip 7pIJJve40gCFLCIREs6zVin/Vk4F9OlSDdoubTHtsP6GRuL3YAI99TV1q A2Ohk3E1FptB1UmU30ZFnu82BpmvY9QXMFERJn4bRRUOxG5t9cMm6iH5A g==; X-IronPort-AV: E=McAfee;i="6200,9189,10272"; a="251980478" X-IronPort-AV: E=Sophos;i="5.90,146,1643702400"; d="scan'208";a="251980478" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Mar 2022 07:14:28 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,146,1643702400"; d="scan'208";a="639397925" Received: from fmsmsx605.amr.corp.intel.com ([10.18.126.85]) by fmsmga002.fm.intel.com with ESMTP; 01 Mar 2022 07:14:23 -0800 Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Tue, 1 Mar 2022 07:14:22 -0800 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21 via Frontend Transport; Tue, 1 Mar 2022 07:14:22 -0800 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.108) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Tue, 1 Mar 2022 07:14:22 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VB5e0O1dq7k0i/Vxa6JPJs5PHvJjU7HNryHjfgCMTSu2hm0RzLi5lgiPJNMYFCD8scNzDsFiANaDF4BjZq6moXIge0QuZuVa4ADj0M88xTxJgIML7ukad/8TRV6MN9IpgzB8qZGnwbT+h9ApdxGbQtqYmRlnvpPeaM4ox1Yv0ARwFQ3cLxDUj7K5uzvib+GDZIif7+GL5h8prXnHm72pn+0yZ6yCHglAiLdap1t958m3MdBhtpOmxf1sMGJZTNtqdHkCUaIrc/hfbv5cnMSrPSBDVXQol4A5DuzhNe1Ux5b1RXTgj+VHuqL1h+MLCZ9oS6MbCwvaPuGGh7EEXbfP7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9Lp165j4CubWADX/MS8J0x5qnB1SffBMS4A1rNeF7Oc=; b=NQCIEpHR9KpXtMZY0PbyqGmB+eSIu2Dd1HSXVZMCAOX1WliDKpSFxCbgvGhxm+qh0hQRE8xltar4wmlJMTGPgXItnLZQO02DgySqH0bHzzxKsEzwxeYWxU60TMK5HypOKD0ZXylGmfTdXylfefFW2cpGZiKhE1Sy/x0wNLrbKf3mRUWCS7GbgOCcQ4cJeX66J4iLH1S4RunKjLOrGsvTZWZZ2JZcKW5RPd5TA2XLuzOABqc5Yl81Z1Gd0J44EslqXHHwEAlA08HVIS0jx6k/97rBvLub7/vUpVi4eCeaPxEdFl84XM38sqjJGPuWeYAzYvkY3F1f8fqW3Ka9WRbT9A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from PH0PR11MB5013.namprd11.prod.outlook.com (2603:10b6:510:30::21) by MWHPR11MB1821.namprd11.prod.outlook.com (2603:10b6:300:10f::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar 2022 15:14:19 +0000 Received: from PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::8189:36b8:ed0e:2501]) by PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::8189:36b8:ed0e:2501%5]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022 15:14:19 +0000 From: "Kusztal, ArkadiuszX" To: Anoob Joseph CC: Akhil Goyal , "Zhang, Roy Fan" , Umesh Kartha , Ramkumar Balu , "dev@dpdk.org" Subject: RE: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus cases Thread-Topic: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus cases Thread-Index: AQHYHNpJWq2EJoXsvUuT1EXBSJb5yqyhASyAgAlP0MCAAHNLMA== Date: Tue, 1 Mar 2022 15:14:19 +0000 Message-ID: References: <20220208105437.15455-1-arkadiuszx.kusztal@intel.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-reaction: no-action dlp-version: 11.6.401.20 dlp-product: dlpe-windows authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: c3375dc8-0fc9-4184-24c4-08d9fb9628bf x-ms-traffictypediagnostic: MWHPR11MB1821:EE_ x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: qGD0MoqR12/MluyjJQ9IzIUlpSB+wQ7tH1TOK0dv9G1xkZoTSSzFSEAq13UKpsr+XhnS6rfsXg0259fxo7ClURX3FB105v8ov+m9Emch8mo1Tn+4O3TOtFVhUPWSSTkHoCaFlmBmTIW8oT4tETgAd8e60E4f0stE3p0EYbAN2uCqp6AA9UOjEJjWYfco1xvnMvL7LBOwyrQfuzKF6o8ZaT+F46f844iy6iyQsRU9Y94LHIlnXJL4JVBP1YYDIKOdoqjTo4iIfBSOs1KXvTL1qYpBowinXty50MNOgZRelIHSrwMsjUlbMT4zgBM5sd1XUz4tgVfzjP+FHT5LMFbnHGoGtD/JHPBoM1PXvFqWpnN6QXssEAFpaj/aZ8XNzUFuj601ZoIB86KEN2V7Sakkk3xKrAYlVgUCSGLUU7WgNNItON6HgroAxbFQEPwXNRxSGPOjgRLHggFFsS1gwjOlR9WMKc9jJdY/1zAzUzO3bAMOcjYbhs3n6DFQasiei1ztItazF3hF4xP13H3Ovt2vUBdVx8pLnC6+BXwsFVVGjVkwwlBi1q9yq9wvdp0OSJt7x19YGPQe2MCb3v4b6AxnTRbinDd8jLKNWTB9ZDNXDA2OVsufXwufpKimjMQMrXOyZEu9+pMZenK3RlgGguiA2VDwRrHAwwP7TicdKPSzioumJsLGlKqbNfqNwk1RyV4bCemeuHdgG6w7qWXVIBIGlA== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5013.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(2906002)(38070700005)(5660300002)(53546011)(9686003)(186003)(26005)(2940100002)(83380400001)(30864003)(82960400001)(86362001)(38100700002)(55016003)(54906003)(316002)(122000001)(6916009)(71200400001)(508600001)(8936002)(52536014)(6506007)(7696005)(4326008)(8676002)(76116006)(64756008)(66946007)(66476007)(33656002)(66446008)(66556008)(579004)(559001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?smempFPWFA2swSfTDaGxl/XLKFqUEWw3aWFM3F/qhkzq+G1Wmq6yjxEicLs0?= =?us-ascii?Q?8OGMylwqeUBn8zr9uRUJeW3BirSwkuEm+lk+q8Ck5RNu1sa6jkKXFo/VL2AT?= =?us-ascii?Q?MDBJ0qj4V825rfYSMnnjnP40TYNpB6OT6z9RolV0pnjvI6BQh/g5MtUKN4ky?= =?us-ascii?Q?NKm4HXjWQY4Ieaqona7Px+IW+8UUiv1MR0NTjMnDHoLte6hht4cSGoc1qVqv?= =?us-ascii?Q?LK4wuLDnNCVb0vVPnteP13XsnHeIS2FIaNlbcWqHaKoG+QZHI0zXCMeTop8o?= =?us-ascii?Q?fcErPNfa7+BLs/ulmZjIYnW4M160yPmllFjPzdGaOZ/IU/m8hMB0bOV8cJ3u?= =?us-ascii?Q?cvuvGsgSQIou+Q2w4p686ZNWk3VcQrZDDisH13LrpTYMp98fcaLn6mMhquLF?= =?us-ascii?Q?cLrfM+9O3rsFc0aPDVcjv9u7JgAxkQsOZ8VGBXCDEn7+2eCsDigLU6gUenAq?= =?us-ascii?Q?NHM/1aa1/sDhvWWPlxiYFuo4S1MYjQllF1nCMVXXl1hNsdvDx0uoXs+jNDDg?= =?us-ascii?Q?iZMCc/hzOTi1nPTEuLCzVQ8slFjOdTaCHCJMJ4O8PKR0AVHLQNgtYhwMfOz3?= =?us-ascii?Q?s04azoh6fiu8pjeTwKBM9iDqS+IcdIm0jONSIhvlwOKb/GtlneCqKmsCUIJi?= =?us-ascii?Q?Fc8lTts5ity0ORVosqAFG6/T7FpAP6Ro/m6Srk5KA9vevYi7EkprOTf3xU4a?= =?us-ascii?Q?mks70h2Pe16038+PpAhNGvX7ZQIUM6CFlW86c9GWha0W9o8o4fgI/MnlEZeb?= =?us-ascii?Q?zA/GZXVrT025Bgc8E0PTO4iIjo3uGteTqD+1ji/AGOHEQPHPu5wdwMzzzdD9?= =?us-ascii?Q?qovbuXmBiiIAfR3Sr/mqY0WVK7MIUgLGgNF6GZQ4G0mlR/ZjE4T2Bfd8sSB4?= =?us-ascii?Q?OUSsHI4e7eyuCR0+MMcJVHEHRa8N3GiwtkxIkWilexniVS9xEgtMVQ7eWzBz?= =?us-ascii?Q?l5rcljt7cRFBeKXipOvDkwHGslbV2URUJkFVuCazuGH/DGsUds+T2JOo48cs?= =?us-ascii?Q?9RyfyjFcE+ywgs9CX7Ctyw92r0N7uQtd7AdoL/8Mm/vLqxK0jyQvB8e1ZtBt?= =?us-ascii?Q?4f5tTUjHcJnMePsFH98iW65WWUtipFwLZPUP6PqKN9LARZOx3QXDK7DOX2Ba?= =?us-ascii?Q?Zur+t0LQLEWDr0nNM8KfXBDUczzLa8teBMypAU10W77C5nqXvvrjgj5Kja7n?= =?us-ascii?Q?vj9Entt131kanHlvlklbV73bKznnvR/lTp25wzEK8vKN/XzowaL/D+w7nAWP?= =?us-ascii?Q?q9Zr0hwttBxi+FIqGJdZGf/ECgSPNJNcPq6Ix5OAofLzvt6TpYRH5uvfvz3d?= =?us-ascii?Q?N6cV2paqbdpKtCpCYCVqkM8VxgeBLWcJy8Hviemd3Ye8zM9XVgKCM1Zx4OKn?= =?us-ascii?Q?IFREZs4V9WKq/r/PDGRJIYga1RD0Orp9QE8GGa7UsH8ttF/vyoUj/2+CmdCZ?= =?us-ascii?Q?gG3Z8jhhr5+UFE+xibnQI2tEMeIq/EWctvhpLAq0A5Zr7YXdAjg4lYsEm4jq?= =?us-ascii?Q?ux+VZiw/+mkoeKXTpz6RqKwUUuOZSQWAgjUAHwvG/pgn5vMF0ccNUfnbQnyj?= =?us-ascii?Q?4+4OMO67yOmlbCLmUVZrLxCICqaxR2daC9GpSqvsg8n3yeb5ZjnwYtCJbxe/?= =?us-ascii?Q?YtQGy9XZZhaKgODwrgxsmg7WI5zoiW6pKwOtHmdGJaIR5iWQVKlR/Z18U08v?= =?us-ascii?Q?zyDTjA=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5013.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: c3375dc8-0fc9-4184-24c4-08d9fb9628bf X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 15:14:19.6292 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: XFHDcfzDdgu3lR+JFrmvFsdW3luc/QUGqHLuw6FRMcQiPapgF6UMcW+wz3enHt1/oCjXhE2QXq1vR4Bql5wjxHpuLJep+QGcCqBwfg97VrU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1821 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org > -----Original Message----- > From: Kusztal, ArkadiuszX > Sent: Tuesday, March 1, 2022 9:38 AM > To: Anoob Joseph > Cc: Akhil Goyal ; Zhang, Roy Fan > ; Umesh Kartha ; > Ramkumar Balu ; dev@dpdk.org > Subject: RE: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus ca= ses >=20 > Hi Anoob, >=20 > > -----Original Message----- > > From: Anoob Joseph > > Sent: Wednesday, February 23, 2022 11:09 AM > > To: Kusztal, ArkadiuszX > > Cc: Akhil Goyal ; Zhang, Roy Fan > > ; Umesh Kartha ; > > Ramkumar Balu ; dev@dpdk.org > > Subject: RE: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus > > cases > > > > Hi Arek, > > > > I agree that these cases may not be particularly useful from > > cryptographic standpoint, but how do we say from what values a PMD > > "must" support? Are you having some trouble supporting some of these > > values? Should we consider extending capabilities to help with this > > rather than just removing the test vectors? >=20 > As for QAT PMD yes, we stopped to support such vectors, for me these vect= ors > are only waste of space. > When extending test cases I would go for PWCT (pairwise conditional tests= ) > between hardware and OpenSSL, it is similar what I am doing when testing = it > internally. > As for capability we could consider such addition. I will send proposal f= or > capability change soon, right now we cannot even check what padding is > supported, which curve etc. On the second though I agree, no need to remove it right now. But we need to prepare better KAT tests for the next release. I will defer this patch in patchwork. >=20 > > > > Thanks, > > Anoob > > > > > -----Original Message----- > > > From: Arek Kusztal > > > Sent: Tuesday, February 8, 2022 4:25 PM > > > To: dev@dpdk.org > > > Cc: Akhil Goyal ; roy.fan.zhang@intel.com; Arek > > > Kusztal > > > Subject: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus > > > cases > > > > > > External Email > > > > > > -------------------------------------------------------------------- > > > -- Even if mod exp tests cases where modulus is not the biggest > > > number are mathematically correct and can be computed, > > > cryptographically it is useless and PMD does not need to support it. > > > > > > Signed-off-by: Arek Kusztal > > > --- > > > app/test/test_cryptodev_mod_test_vectors.h | 501 > > > ---------------------------- > > > - > > > 1 file changed, 501 deletions(-) > > > > > > diff --git a/app/test/test_cryptodev_mod_test_vectors.h > > > b/app/test/test_cryptodev_mod_test_vectors.h > > > index c66f4b18bc..d108059624 100644 > > > --- a/app/test/test_cryptodev_mod_test_vectors.h > > > +++ b/app/test/test_cryptodev_mod_test_vectors.h > > > @@ -167,141 +167,6 @@ modex_test_data modex_test_case[] =3D { }, { > > > .description =3D "Modular Exponentiation " > > > - "(mod=3D8, base=3D65, exp=3D17, res=3D8)", > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > - .base =3D { > > > - .data =3D { > > > - 0x25, 0x74, 0x41, 0xCE, 0xFA, 0x5C, 0x07, 0x2A, > > > - 0xD1, 0x74, 0xF3, 0x3D, 0xE1, 0xCC, 0xC3, 0x18, > > > - 0x7E, 0x4A, 0x21, 0x9F, 0x97, 0xA3, 0x26, 0x85, > > > - 0x85, 0xD9, 0x9B, 0xE3, 0xBA, 0xB3, 0x70, 0xC9, > > > - 0x26, 0x68, 0xE4, 0xB7, 0x4C, 0x88, 0x48, 0xC1, > > > - 0x6B, 0xC6, 0x3C, 0x00, 0x8C, 0x6B, 0xC6, 0x11, > > > - 0xD0, 0xD6, 0x61, 0x5D, 0xEC, 0xAA, 0xBA, 0x3B, > > > - 0x7D, 0xB3, 0x0D, 0x3F, 0xA5, 0x4D, 0xEE, 0xE4, > > > - 0xAC > > > - }, > > > - .len =3D 65 > > > - }, > > > - .exponent =3D { > > > - .data =3D { > > > - 0x1C, 0x54, 0x2F, 0xCA, 0xDE, 0x4F, 0x17, 0x38, > > > - 0x69, 0x87, 0xB4, 0xFF, 0x3A, 0x6C, 0x82, 0x70, > > > - 0x53 > > > - }, > > > - .len =3D 17 > > > - }, > > > - .reminder =3D { > > > - .data =3D { > > > - 0x52, 0x06, 0x1A, 0x35, 0x70, 0x33, 0x78, 0x45 > > > - }, > > > - .len =3D 8 > > > - }, > > > - .modulus =3D { > > > - .data =3D { > > > - 0x6B, 0x6D, 0xFA, 0xCB, 0x09, 0x5D, 0x9C, 0xFD > > > - }, > > > - .len =3D 8 > > > - }, > > > - .result_len =3D 8 > > > -}, > > > -{ > > > - .description =3D "Modular Exponentiation " > > > - "(mod=3D100, base=3D150, exp=3D192, res=3D100)", > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > - .base =3D { > > > - .data =3D { > > > - 0xC1, 0xA1, 0x04, 0xE4, 0x4D, 0x4A, 0xD3, 0x5C, > > > - 0xB3, 0xD0, 0x16, 0x51, 0xA7, 0xF4, 0x82, 0x6C, > > > - 0x22, 0xDD, 0x4D, 0xAA, 0x70, 0x30, 0x25, 0xA7, > > > - 0xFA, 0xA9, 0xF2, 0x20, 0x55, 0x9B, 0xEA, 0x26, > > > - 0xF6, 0xB5, 0xF8, 0x9C, 0x46, 0x21, 0x85, 0x0E, > > > - 0x38, 0x73, 0x01, 0xC6, 0x72, 0x67, 0x9B, 0x49, > > > - 0xCE, 0x48, 0xB7, 0x4A, 0xEE, 0x08, 0x21, 0x26, > > > - 0xF3, 0x21, 0x77, 0xE7, 0x3C, 0x77, 0xF4, 0x0A, > > > - 0x82, 0xC8, 0x16, 0x94, 0x6C, 0xBF, 0xA8, 0xD8, > > > - 0x8B, 0x7D, 0x27, 0x60, 0xAC, 0x06, 0x69, 0x7E, > > > - 0x46, 0x2C, 0xE2, 0xD1, 0x13, 0x50, 0x7D, 0xCE, > > > - 0x4D, 0xC4, 0x5D, 0x81, 0xFB, 0x6B, 0x11, 0x4A, > > > - 0x2D, 0xA2, 0x03, 0x55, 0x77, 0x8C, 0x3D, 0xA1, > > > - 0xAD, 0xBE, 0x9C, 0x72, 0xE5, 0xA5, 0xFB, 0x49, > > > - 0x5F, 0x13, 0x48, 0xC7, 0xAC, 0xD1, 0x0F, 0x5E, > > > - 0xDF, 0x9C, 0xC7, 0xF5, 0x19, 0xFD, 0xC5, 0x77, > > > - 0x27, 0x8D, 0xC4, 0x1D, 0x90, 0x8C, 0x20, 0x96, > > > - 0xC8, 0x6A, 0x0D, 0x2F, 0xE2, 0x8B, 0xB0, 0x58, > > > - 0xF8, 0xC4, 0x31, 0x0A, 0x17, 0x11 > > > - }, > > > - .len =3D 150 > > > - }, > > > - .exponent =3D { > > > - .data =3D { > > > - 0xC6, 0x20, 0x99, 0xD9, 0xBC, 0xE2, 0xAD, 0x74, > > > - 0x11, 0x6F, 0x74, 0x14, 0x72, 0xB8, 0x09, 0xCB, > > > - 0x5C, 0x74, 0x11, 0x21, 0x17, 0x84, 0x02, 0xDC, > > > - 0x70, 0x59, 0x20, 0x79, 0x40, 0x7B, 0x0E, 0x52, > > > - 0xAD, 0x00, 0x38, 0x4F, 0x5A, 0xE5, 0x0D, 0x28, > > > - 0xB5, 0xF8, 0xDC, 0x54, 0x92, 0xB2, 0xB0, 0xA8, > > > - 0xE8, 0x35, 0x1B, 0x63, 0x0D, 0x6A, 0x50, 0x8D, > > > - 0xE1, 0x3E, 0x7A, 0xDD, 0x42, 0x7A, 0xD0, 0xB4, > > > - 0x9D, 0x63, 0x36, 0x03, 0xC0, 0x9B, 0xA0, 0x91, > > > - 0x8B, 0xBC, 0x45, 0x53, 0x93, 0x2C, 0xFC, 0xDD, > > > - 0x4F, 0xBD, 0x96, 0x0B, 0x63, 0xEB, 0xEF, 0x50, > > > - 0xAC, 0x99, 0x45, 0xA7, 0x0D, 0xC6, 0xEA, 0x98, > > > - 0xBC, 0xD7, 0x63, 0x56, 0x8C, 0x75, 0x68, 0xAE, > > > - 0xF0, 0xB4, 0x66, 0xA0, 0x4D, 0xC5, 0x71, 0xB9, > > > - 0x4E, 0xCB, 0xF6, 0xCA, 0xC9, 0x1B, 0x3B, 0x55, > > > - 0x91, 0x39, 0x25, 0xBD, 0x98, 0xAA, 0xDA, 0xF2, > > > - 0x8A, 0xCB, 0x8E, 0x56, 0x09, 0xBF, 0xC4, 0x1D, > > > - 0xFA, 0x23, 0x48, 0xF6, 0x9A, 0xD2, 0xD3, 0x2B, > > > - 0xED, 0x60, 0x9B, 0x4B, 0x63, 0xD8, 0x8C, 0x6A, > > > - 0x28, 0xA3, 0x4C, 0x85, 0x43, 0x4D, 0x5C, 0x4A, > > > - 0xA7, 0xA9, 0x9F, 0x7E, 0x13, 0x5B, 0x36, 0xED, > > > - 0xD9, 0x53, 0xBE, 0x12, 0xFF, 0x17, 0x9F, 0x70, > > > - 0xA4, 0xD2, 0x42, 0x72, 0x70, 0x51, 0x70, 0x3F, > > > - 0x5A, 0xBA, 0x33, 0x0E, 0xBB, 0x4C, 0xA0, 0x4A > > > - }, > > > - .len =3D 192 > > > - }, > > > - .reminder =3D { > > > - .data =3D { > > > - 0x07, 0x5E, 0x28, 0x4F, 0xD1, 0xEA, 0x5C, 0x1D, > > > - 0xF8, 0xBF, 0x29, 0xF0, 0x63, 0xCC, 0xF7, 0x6D, > > > - 0x99, 0x67, 0xCE, 0xE3, 0x05, 0x16, 0x16, 0x8C, > > > - 0x3A, 0x07, 0xC0, 0x63, 0x70, 0xB9, 0x1A, 0x24, > > > - 0xED, 0xE9, 0xF0, 0xEE, 0xD9, 0xAB, 0x18, 0xD4, > > > - 0x59, 0xB4, 0xD2, 0x77, 0x44, 0x94, 0x72, 0xFE, > > > - 0x19, 0x26, 0x50, 0x47, 0x77, 0xAD, 0x0A, 0x45, > > > - 0x76, 0x4B, 0x22, 0xDB, 0x05, 0x13, 0x67, 0x40, > > > - 0x9A, 0x36, 0x6C, 0x5E, 0xE8, 0xED, 0x40, 0x60, > > > - 0x86, 0x40, 0x2F, 0x30, 0x9E, 0x4B, 0x61, 0x73, > > > - 0x2E, 0x76, 0x8A, 0xB0, 0x49, 0x04, 0x1A, 0x82, > > > - 0xB7, 0xEF, 0xB2, 0xB5, 0xB4, 0xE0, 0x87, 0xF0, > > > - 0xB4, 0x53, 0xB2, 0xBE > > > - }, > > > - .len =3D 100 > > > - }, > > > - .modulus =3D { > > > - .data =3D { > > > - 0x54, 0x58, 0x5C, 0xBA, 0xAE, 0xC1, 0xB4, 0x46, > > > - 0x50, 0xAF, 0xD0, 0xA6, 0x03, 0x9D, 0x74, 0x84, > > > - 0x6F, 0x89, 0x07, 0xA6, 0x63, 0xE7, 0x34, 0xB2, > > > - 0x55, 0x0E, 0xD5, 0x42, 0xC9, 0xBF, 0xD1, 0x89, > > > - 0x54, 0x0B, 0x76, 0xF7, 0x0E, 0xA1, 0x42, 0x02, > > > - 0x72, 0xDC, 0x28, 0x5A, 0x68, 0x10, 0xA0, 0x84, > > > - 0xA4, 0x72, 0x4D, 0x40, 0x69, 0xBC, 0x18, 0xC9, > > > - 0x92, 0x69, 0xB8, 0x52, 0x2A, 0xB1, 0xA3, 0x43, > > > - 0x80, 0xA9, 0x55, 0x78, 0xEA, 0xD9, 0x54, 0xF4, > > > - 0x3A, 0xDD, 0x24, 0x4E, 0x22, 0x9D, 0x89, 0x40, > > > - 0x8F, 0x50, 0xA5, 0xF5, 0x0F, 0xFA, 0x38, 0xBB, > > > - 0xE8, 0xD7, 0x21, 0x6B, 0xEA, 0xB1, 0x28, 0x48, > > > - 0xEB, 0x75, 0xB1, 0xC7 > > > - }, > > > - .len =3D 100 > > > - }, > > > - .result_len =3D 100 > > > -}, > > > -{ > > > - .description =3D "Modular Exponentiation " > > > "(mod=3D255, base=3D20, exp=3D10, res=3D255)", > > > .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > .base =3D { > > > @@ -397,272 +262,6 @@ modex_test_data modex_test_case[] =3D { }, { > > > .description =3D "Modular Exponentiation " > > > - "(mod=3D112, base=3D257, exp=3D43, res=3D112)", > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > - .base =3D { > > > - .data =3D { > > > - 0x53, 0x63, 0xB0, 0x3A, 0x30, 0xDE, 0x07, 0xBC, > > > - 0xE4, 0x4B, 0x52, 0x37, 0x9C, 0xD8, 0x5A, 0xCD, > > > - 0x03, 0xE1, 0xEA, 0x6D, 0xDE, 0x4C, 0x19, 0xE6, > > > - 0xA2, 0x0F, 0xAE, 0x56, 0xCD, 0xB2, 0xB6, 0x5B, > > > - 0x31, 0xF5, 0x41, 0x48, 0x8D, 0xA2, 0xC7, 0x0C, > > > - 0x19, 0x32, 0x6D, 0x58, 0x10, 0xD5, 0xF0, 0x64, > > > - 0xF9, 0xF5, 0xD7, 0xFE, 0x37, 0x4A, 0xD8, 0xE3, > > > - 0xBF, 0xDF, 0xCB, 0x45, 0xD5, 0xBF, 0xB9, 0x2A, > > > - 0x60, 0xF8, 0x52, 0xB0, 0xB5, 0x22, 0x76, 0xBD, > > > - 0xD3, 0x0D, 0xD4, 0xE1, 0x42, 0xC4, 0x8C, 0x47, > > > - 0x2D, 0x04, 0x25, 0x1B, 0xFB, 0x21, 0xFD, 0x80, > > > - 0xC0, 0xCE, 0x9D, 0x32, 0x76, 0x8E, 0x18, 0x28, > > > - 0xDC, 0x0F, 0x44, 0x37, 0xF8, 0x61, 0x45, 0x93, > > > - 0xD3, 0x62, 0x21, 0xEE, 0x8B, 0x89, 0x8B, 0xAF, > > > - 0x8B, 0xE9, 0xA5, 0xD2, 0x00, 0xF5, 0xFF, 0xE6, > > > - 0xE0, 0x56, 0x9D, 0x41, 0x13, 0xBC, 0xD6, 0x6E, > > > - 0xC9, 0xE8, 0xE8, 0xC7, 0x61, 0x00, 0x7D, 0x91, > > > - 0x59, 0xAC, 0x6A, 0x24, 0x86, 0x3C, 0x50, 0xFB, > > > - 0x49, 0xC4, 0xB9, 0x41, 0xCD, 0xF0, 0xD9, 0xE7, > > > - 0xE1, 0x54, 0x3F, 0x17, 0x3B, 0xC7, 0x12, 0x20, > > > - 0x6E, 0xC5, 0x80, 0x11, 0xA5, 0x78, 0x72, 0xCA, > > > - 0xBC, 0x90, 0xB7, 0xC5, 0xFF, 0x78, 0xE5, 0x71, > > > - 0x62, 0x4C, 0xCC, 0x6C, 0xEA, 0x76, 0xE3, 0xB6, > > > - 0x00, 0x54, 0x31, 0x72, 0x5A, 0xFE, 0x14, 0xC3, > > > - 0x60, 0x3A, 0x79, 0x97, 0x26, 0x87, 0x69, 0x8D, > > > - 0x44, 0x8E, 0x8B, 0xE0, 0xBC, 0x5C, 0x9F, 0xDE, > > > - 0xD0, 0x90, 0xA2, 0x85, 0xC8, 0x3E, 0x7E, 0xA0, > > > - 0x42, 0xE2, 0x3B, 0xEE, 0x0C, 0x59, 0x1E, 0x72, > > > - 0x62, 0xA5, 0xEE, 0x20, 0xE0, 0xFE, 0x0D, 0xD3, > > > - 0x9F, 0xA9, 0x84, 0xBC, 0xD0, 0x6E, 0x5E, 0xC2, > > > - 0x0B, 0xF2, 0xAE, 0xB6, 0xE6, 0xC6, 0x88, 0xF9, > > > - 0x51, 0xF8, 0x02, 0x08, 0xC6, 0x99, 0x73, 0xF2, > > > - 0x36 > > > - }, > > > - .len =3D 257 > > > - }, > > > - .exponent =3D { > > > - .data =3D { > > > - 0xCA, 0x5C, 0x73, 0xF7, 0x8B, 0x1F, 0x95, 0xE4, > > > - 0x0E, 0x9B, 0x47, 0xDC, 0x03, 0x96, 0x75, 0xB4, > > > - 0x48, 0x74, 0x73, 0xBE, 0xF8, 0x92, 0x80, 0xE4, > > > - 0x93, 0x5D, 0x87, 0x7D, 0x74, 0xF7, 0x45, 0xEF, > > > - 0x8E, 0x53, 0x9C, 0x03, 0xB0, 0xD6, 0xF3, 0xBF, > > > - 0x86, 0xB2, 0xCD > > > - }, > > > - .len =3D 43 > > > - }, > > > - .reminder =3D { > > > - .data =3D { > > > - 0x01, 0x0E, 0x8C, 0x1B, 0x19, 0xF6, 0xB0, 0x0D, > > > - 0x8D, 0xFF, 0x12, 0x74, 0xF0, 0xD0, 0xB1, 0xA2, > > > - 0x49, 0xA4, 0xA3, 0x9C, 0x4D, 0xFA, 0xA7, 0xB7, > > > - 0x6E, 0x45, 0xCC, 0x0D, 0x75, 0xC7, 0xF7, 0x99, > > > - 0x1F, 0x01, 0x44, 0x7B, 0xF2, 0xF9, 0x73, 0x67, > > > - 0x75, 0xD9, 0x4C, 0x2F, 0xA9, 0xB4, 0x59, 0x9E, > > > - 0xF9, 0x2C, 0xB9, 0x14, 0x5D, 0x5C, 0x18, 0x72, > > > - 0xEC, 0x27, 0x1A, 0x2D, 0xFB, 0xDA, 0xEB, 0x2F, > > > - 0x98, 0xA9, 0xC2, 0x01, 0x75, 0x7A, 0x27, 0x07, > > > - 0x94, 0x71, 0x3F, 0x90, 0xDF, 0x56, 0x6F, 0x23, > > > - 0x47, 0x12, 0xAD, 0x32, 0x7A, 0xBC, 0x91, 0x36, > > > - 0x43, 0xD2, 0x88, 0x3D, 0x2C, 0x31, 0x85, 0xE6, > > > - 0x22, 0x2E, 0xCF, 0x53, 0x87, 0x0D, 0xAE, 0x72, > > > - 0x31, 0x21, 0x52, 0x0C, 0xDF, 0xAC, 0xEA, 0x57 > > > - }, > > > - .len =3D 112 > > > - }, > > > - .modulus =3D { > > > - .data =3D { > > > - 0x20, 0x7E, 0x78, 0xFC, 0x54, 0x40, 0x47, 0xED, > > > - 0x7B, 0x26, 0x21, 0x94, 0x6D, 0x9C, 0xDC, 0xB7, > > > - 0x7C, 0xB8, 0xDE, 0x57, 0x3C, 0x64, 0x47, 0x50, > > > - 0xDB, 0x92, 0x0A, 0x5A, 0x85, 0x77, 0x84, 0xE3, > > > - 0xC7, 0xEA, 0x33, 0xA2, 0x63, 0xDA, 0x63, 0xE3, > > > - 0xDF, 0x07, 0x32, 0x85, 0xDC, 0xC3, 0xF0, 0x7C, > > > - 0xD8, 0x44, 0xC4, 0xDE, 0x2C, 0xB7, 0x91, 0xAE, > > > - 0xCD, 0xA2, 0xB3, 0x6B, 0x43, 0x04, 0x88, 0xBE, > > > - 0x3B, 0x50, 0xE1, 0x88, 0xD0, 0x20, 0x04, 0x36, > > > - 0xA4, 0xA0, 0xB0, 0x3B, 0x61, 0x9B, 0x83, 0xDB, > > > - 0x05, 0x77, 0x5A, 0x5E, 0x87, 0xA6, 0xBE, 0x6A, > > > - 0x2A, 0xB4, 0x30, 0x10, 0x8D, 0x3B, 0xBC, 0x84, > > > - 0x9E, 0xB2, 0x21, 0x7E, 0xAC, 0x67, 0x94, 0x9F, > > > - 0xF1, 0x32, 0x3C, 0xF0, 0x94, 0x83, 0xF8, 0x19 > > > - }, > > > - .len =3D 112 > > > - }, > > > - .result_len =3D 112 > > > -}, > > > -{ > > > - .description =3D "Modular Exponentiation " > > > - "(mod=3D299, base=3D240, exp=3D321, res=3D299)", > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > - .base =3D { > > > - .data =3D { > > > - 0xAF, 0xE4, 0xCF, 0x9F, 0x7C, 0x20, 0x72, 0xE9, > > > - 0x50, 0x2E, 0xE5, 0xE4, 0xEF, 0x80, 0x28, 0xB3, > > > - 0x3A, 0x92, 0xAC, 0xCD, 0xF1, 0x6B, 0x7D, 0x83, > > > - 0x78, 0x4E, 0x9B, 0x30, 0x1E, 0xF4, 0x11, 0x15, > > > - 0x49, 0xAC, 0x06, 0xA2, 0x92, 0xB9, 0x91, 0x1B, > > > - 0xE8, 0xC8, 0xBC, 0x8A, 0x6F, 0xB2, 0xB8, 0x7C, > > > - 0xC5, 0xD3, 0x68, 0x60, 0xA4, 0x37, 0x7A, 0x6E, > > > - 0x3A, 0x1C, 0xAE, 0xAC, 0x70, 0x7B, 0x03, 0xE0, > > > - 0xDC, 0x7D, 0x51, 0x2E, 0x04, 0xC1, 0xD4, 0xA8, > > > - 0x5A, 0xE1, 0xE8, 0xAD, 0x83, 0x0C, 0x0C, 0x2D, > > > - 0x93, 0x8A, 0x07, 0x25, 0xC6, 0xE1, 0xAB, 0xD7, > > > - 0x2F, 0xC4, 0x14, 0x2E, 0x68, 0x89, 0xA7, 0xEA, > > > - 0x4E, 0x7B, 0xC4, 0x05, 0xD4, 0xB7, 0xC1, 0x9B, > > > - 0x9D, 0x8D, 0x58, 0x33, 0xE3, 0xB0, 0x58, 0xD8, > > > - 0xCF, 0x6D, 0xA9, 0xC6, 0x96, 0xE3, 0x6E, 0xAA, > > > - 0x23, 0x17, 0x19, 0x74, 0xE0, 0x7B, 0x50, 0x7A, > > > - 0x57, 0x49, 0xFD, 0xFA, 0x3E, 0x7D, 0xF9, 0xB6, > > > - 0x30, 0x5F, 0x1C, 0xE4, 0x5F, 0xC7, 0x3D, 0x5B, > > > - 0x9E, 0xF5, 0xB6, 0x2F, 0xEA, 0xCF, 0x31, 0x35, > > > - 0xC0, 0x60, 0xDE, 0x18, 0xC5, 0x0D, 0xBB, 0xC5, > > > - 0xD1, 0x1D, 0x25, 0x7C, 0x8C, 0x35, 0x8A, 0x71, > > > - 0xA8, 0x01, 0x9E, 0xEA, 0x8F, 0xD4, 0x5D, 0x52, > > > - 0x86, 0xB7, 0x11, 0xC8, 0xF2, 0x97, 0xD0, 0x73, > > > - 0x7C, 0xAB, 0xBB, 0xF4, 0x38, 0x4E, 0x48, 0xB5, > > > - 0x70, 0x35, 0x2A, 0xC5, 0x14, 0x86, 0x2E, 0x64, > > > - 0x91, 0x32, 0x37, 0x5E, 0x1A, 0x00, 0xAC, 0xF1, > > > - 0xFC, 0x36, 0xEA, 0x7F, 0x50, 0xAF, 0x02, 0xEC, > > > - 0x06, 0xE8, 0x55, 0x68, 0x0D, 0x9A, 0x58, 0x4D, > > > - 0xBD, 0xB9, 0x62, 0x25, 0xAB, 0x94, 0xD7, 0x37, > > > - 0xAD, 0xB4, 0x9F, 0xB4, 0x3A, 0x07, 0x45, 0x4B > > > - }, > > > - .len =3D 240 > > > - }, > > > - .exponent =3D { > > > - .data =3D { > > > - 0xB1, 0xC2, 0x86, 0xFA, 0xE2, 0xF1, 0x71, 0x9C, > > > - 0x61, 0x23, 0xAB, 0x37, 0xC6, 0x4F, 0x17, 0xFE, > > > - 0x4D, 0xAC, 0x11, 0xD4, 0x36, 0xEE, 0xCB, 0xAE, > > > - 0x46, 0x88, 0xA4, 0x92, 0x20, 0x6D, 0xDC, 0xF1, > > > - 0xE4, 0x94, 0x72, 0x07, 0x64, 0x84, 0xF4, 0x83, > > > - 0x31, 0x0C, 0x04, 0xF7, 0x5B, 0x68, 0xE6, 0x7A, > > > - 0x6C, 0xCD, 0x6C, 0xBF, 0x03, 0x07, 0x5A, 0x91, > > > - 0x37, 0x3A, 0x73, 0xFF, 0xB2, 0x11, 0x88, 0x39, > > > - 0x19, 0xEB, 0x1C, 0x0E, 0x45, 0x99, 0xE6, 0x4E, > > > - 0xE4, 0xB1, 0x57, 0xBE, 0xBE, 0x7A, 0xE8, 0x56, > > > - 0x19, 0x92, 0xAC, 0xBD, 0x78, 0xCC, 0x54, 0xDC, > > > - 0x2D, 0xE6, 0x7D, 0x61, 0xE1, 0x27, 0xA7, 0x43, > > > - 0x46, 0x25, 0x51, 0x95, 0x47, 0xF6, 0xB1, 0x68, > > > - 0x17, 0xE6, 0x21, 0xD4, 0x83, 0x1E, 0x32, 0xAF, > > > - 0x22, 0xA4, 0x7D, 0x3D, 0x1F, 0xE6, 0x43, 0x96, > > > - 0x64, 0xAB, 0xC5, 0x81, 0xBC, 0x79, 0x14, 0x54, > > > - 0x02, 0x78, 0x79, 0x71, 0x58, 0xC2, 0x2E, 0x56, > > > - 0x21, 0x6B, 0x40, 0xDB, 0x79, 0xD1, 0x80, 0x5D, > > > - 0x61, 0xF0, 0x9F, 0x4A, 0xC3, 0x8F, 0xAC, 0x98, > > > - 0x94, 0x88, 0x2C, 0xA5, 0xCB, 0x06, 0x47, 0x73, > > > - 0x27, 0x71, 0xA8, 0x0C, 0xBD, 0xFD, 0x83, 0xBF, > > > - 0xA2, 0xCC, 0x91, 0x63, 0x9D, 0xC5, 0x58, 0x50, > > > - 0x53, 0x98, 0xA0, 0x5F, 0x0B, 0xDE, 0x15, 0x65, > > > - 0xFB, 0x5D, 0xF1, 0x9C, 0xD0, 0xC3, 0x6B, 0x4D, > > > - 0x31, 0x20, 0x2F, 0x4D, 0x4F, 0x9D, 0xEB, 0xCB, > > > - 0xFC, 0xDA, 0x54, 0xC1, 0x57, 0x10, 0x0F, 0xFC, > > > - 0xD2, 0xA7, 0x44, 0x0E, 0x89, 0x0D, 0x89, 0x56, > > > - 0x1E, 0x40, 0x64, 0xFF, 0x9E, 0xB1, 0x5C, 0x9A, > > > - 0x6E, 0xE5, 0xE9, 0x48, 0xAB, 0x27, 0x91, 0x9A, > > > - 0x3B, 0x8D, 0xB6, 0xA0, 0xD6, 0xD8, 0x9B, 0xBD, > > > - 0x0D, 0x1D, 0x90, 0xED, 0x54, 0xE1, 0x75, 0x5B, > > > - 0x89, 0xE1, 0x0C, 0xC7, 0x42, 0xD7, 0x68, 0xCB, > > > - 0x41, 0x59, 0xC1, 0x96, 0xD9, 0x77, 0x88, 0xF1, > > > - 0x68, 0x90, 0xDA, 0xE0, 0xB7, 0x1E, 0x2C, 0xDB, > > > - 0x27, 0x78, 0xC0, 0x15, 0x68, 0x9E, 0xF7, 0x48, > > > - 0x45, 0xFC, 0x22, 0x5D, 0x2B, 0xFA, 0xC7, 0x81, > > > - 0x26, 0x60, 0xF7, 0x50, 0xEE, 0xF9, 0x61, 0xF8, > > > - 0x59, 0x28, 0x92, 0xEE, 0xD7, 0x92, 0x5F, 0x5E, > > > - 0xA5, 0x5A, 0x4C, 0xC7, 0x89, 0x9B, 0x9F, 0x8F, > > > - 0x01, 0x3B, 0x9D, 0x8D, 0xF8, 0x6B, 0xEE, 0x64, > > > - 0x54 > > > - }, > > > - .len =3D 321 > > > - }, > > > - .reminder =3D { > > > - .data =3D { > > > - 0x4A, 0x18, 0x9C, 0xCB, 0x90, 0x71, 0x8E, 0xD3, > > > - 0xCA, 0xEB, 0xF1, 0xE7, 0xE8, 0xB0, 0x19, 0x9C, > > > - 0x05, 0x51, 0x29, 0x8C, 0xB9, 0x6D, 0x1B, 0x05, > > > - 0xDC, 0x16, 0x91, 0x0E, 0x69, 0xF3, 0x76, 0x29, > > > - 0x9D, 0x91, 0x21, 0x98, 0x56, 0x9A, 0x22, 0x20, > > > - 0xDF, 0x75, 0x4D, 0x40, 0x51, 0x99, 0x6E, 0xEA, > > > - 0x37, 0x22, 0xF4, 0x27, 0x04, 0x6E, 0xDC, 0xB2, > > > - 0xF5, 0xF6, 0xF8, 0xD6, 0xA8, 0xB7, 0x2D, 0xB7, > > > - 0x18, 0x44, 0xF7, 0x62, 0x91, 0x44, 0x97, 0x91, > > > - 0x6C, 0x14, 0x7E, 0xEB, 0x00, 0xB0, 0x3F, 0x7D, > > > - 0x7B, 0x4A, 0xD0, 0x04, 0xD2, 0xCC, 0x5A, 0x22, > > > - 0xB5, 0x0E, 0xAB, 0x1A, 0xB0, 0xD7, 0x97, 0xDD, > > > - 0xE5, 0x78, 0xA9, 0x97, 0xF4, 0xC7, 0xE0, 0x28, > > > - 0x00, 0xF3, 0x48, 0xCA, 0x69, 0xD0, 0xE8, 0x43, > > > - 0x12, 0x82, 0x24, 0xBA, 0x28, 0xBD, 0x8E, 0xCB, > > > - 0xB1, 0x98, 0x08, 0xC5, 0x0F, 0xF2, 0xE9, 0xA2, > > > - 0x6C, 0xCC, 0xA9, 0x21, 0xA6, 0x38, 0xAE, 0x88, > > > - 0x35, 0x5E, 0xBB, 0xEF, 0x37, 0xAB, 0xDA, 0x07, > > > - 0x5F, 0x0A, 0xB4, 0x29, 0x65, 0x24, 0x22, 0x6C, > > > - 0x9E, 0xF5, 0x19, 0xA4, 0x8E, 0x5A, 0xFA, 0xFC, > > > - 0x97, 0x8A, 0xE8, 0x2B, 0x6D, 0x4B, 0xD0, 0xFB, > > > - 0x86, 0xB9, 0xE7, 0x2C, 0x08, 0x25, 0x17, 0x90, > > > - 0x77, 0x54, 0xE0, 0xBA, 0x0F, 0x59, 0x6C, 0x8C, > > > - 0x0E, 0xCF, 0x54, 0x55, 0x6C, 0xF1, 0x65, 0x48, > > > - 0xCC, 0xF4, 0xAB, 0xA1, 0x91, 0x07, 0x29, 0xFC, > > > - 0x46, 0xBC, 0x2C, 0x85, 0xA1, 0x0C, 0x8A, 0x77, > > > - 0x7A, 0xC6, 0x01, 0x34, 0xCE, 0x92, 0x1D, 0x88, > > > - 0x54, 0x23, 0x26, 0x9B, 0x6B, 0x80, 0x6D, 0x08, > > > - 0x99, 0xAE, 0xC0, 0xF6, 0x45, 0x97, 0xAF, 0xCD, > > > - 0x2F, 0x4A, 0x7E, 0xAB, 0xD8, 0x31, 0x48, 0xA1, > > > - 0xEB, 0x5E, 0xD1, 0xC0, 0xE7, 0xD5, 0x37, 0x3D, > > > - 0x03, 0xA3, 0x16, 0x09, 0xD4, 0xDE, 0xC3, 0x97, > > > - 0x13, 0xB6, 0x67, 0x55, 0x8A, 0x71, 0x51, 0x66, > > > - 0xF5, 0xA1, 0x3B, 0xE3, 0x49, 0x8D, 0x7C, 0x52, > > > - 0xCD, 0xA7, 0x11, 0xDD, 0xE0, 0xA0, 0x5C, 0xD8, > > > - 0xF8, 0xDF, 0x01, 0xC5, 0x61, 0x87, 0xB4, 0xDE, > > > - 0x3E, 0x39, 0xED, 0xC3, 0x3F, 0x84, 0x70, 0x37, > > > - 0xBA, 0xDB, 0x5B > > > - }, > > > - .len =3D 299 > > > - }, > > > - .modulus =3D { > > > - .data =3D { > > > - 0x85, 0x04, 0x13, 0x7C, 0x4D, 0xBF, 0xC6, 0x25, > > > - 0xD9, 0xAA, 0x1F, 0xED, 0x00, 0x69, 0xD7, 0x6C, > > > - 0xB0, 0x46, 0x52, 0xA5, 0xF4, 0xF6, 0x55, 0x16, > > > - 0x67, 0x52, 0x09, 0xF0, 0x28, 0xA7, 0x30, 0x22, > > > - 0x34, 0xF1, 0xEA, 0xEB, 0x7C, 0x18, 0xEE, 0xAC, > > > - 0x1A, 0xC1, 0xF5, 0x31, 0x7E, 0xA4, 0x4A, 0x0C, > > > - 0xEA, 0xFE, 0x33, 0xDB, 0x49, 0x04, 0xFD, 0x33, > > > - 0x3F, 0xB1, 0x41, 0x1F, 0xBD, 0x43, 0x71, 0xDE, > > > - 0xB9, 0xA2, 0x4F, 0x20, 0x57, 0xAF, 0x27, 0x37, > > > - 0x58, 0xA8, 0x51, 0x5D, 0x4E, 0xAB, 0x17, 0x1C, > > > - 0x99, 0xD9, 0xB2, 0x0D, 0x21, 0xCA, 0x35, 0x52, > > > - 0xF2, 0x4C, 0x7C, 0x79, 0x83, 0x2C, 0xF2, 0x87, > > > - 0xC5, 0x58, 0x6E, 0x6E, 0x48, 0xFB, 0x32, 0x4D, > > > - 0x1C, 0xDC, 0xE9, 0xDA, 0x9B, 0x77, 0x19, 0xD9, > > > - 0x78, 0xE4, 0xF5, 0x3A, 0x49, 0x3D, 0x0D, 0x3D, > > > - 0x10, 0x77, 0x0B, 0xC2, 0xE6, 0x66, 0x68, 0xFA, > > > - 0x55, 0x99, 0x65, 0x5E, 0x55, 0x87, 0xCF, 0x3C, > > > - 0x9C, 0x6C, 0x08, 0x09, 0x1F, 0x9C, 0xCB, 0x5E, > > > - 0xE5, 0x19, 0x39, 0xA9, 0x2F, 0xF0, 0x49, 0x3D, > > > - 0x7C, 0xB6, 0x7B, 0xA2, 0x93, 0xF1, 0x52, 0xD8, > > > - 0x92, 0xDD, 0x56, 0x57, 0x8E, 0xE2, 0x5F, 0xA0, > > > - 0x64, 0xB2, 0xC5, 0x0F, 0xB9, 0x89, 0xA6, 0x3F, > > > - 0x54, 0x51, 0x2D, 0x01, 0x51, 0x78, 0x32, 0xE1, > > > - 0xA7, 0x4D, 0x45, 0xC0, 0xD0, 0x6C, 0xE7, 0xCA, > > > - 0xB2, 0x3F, 0x17, 0xD4, 0xB6, 0x58, 0x9B, 0xA8, > > > - 0xBA, 0x2F, 0x3D, 0x1D, 0x6A, 0x73, 0x82, 0x2B, > > > - 0x26, 0x2E, 0x7A, 0xEE, 0xEA, 0x41, 0x25, 0xFE, > > > - 0xF0, 0xA2, 0x9C, 0x60, 0x35, 0xAD, 0x34, 0x30, > > > - 0x55, 0x02, 0x6B, 0x06, 0xF4, 0xAD, 0x91, 0xA3, > > > - 0xA2, 0x9C, 0x12, 0x8D, 0xDF, 0x2B, 0x3F, 0x0C, > > > - 0x54, 0xCB, 0x98, 0xBA, 0xA1, 0x33, 0x70, 0xEF, > > > - 0xF1, 0xEE, 0x15, 0xB7, 0xC6, 0x27, 0x47, 0x83, > > > - 0x90, 0x58, 0x08, 0x16, 0x83, 0x94, 0xE9, 0x95, > > > - 0x8B, 0x03, 0xD0, 0x3C, 0x45, 0xF8, 0x90, 0xC9, > > > - 0xA7, 0x64, 0x76, 0xE8, 0x01, 0xA4, 0xA2, 0xAD, > > > - 0x6F, 0x19, 0xCF, 0x38, 0x9A, 0xAB, 0x6E, 0xBE, > > > - 0x79, 0xE4, 0x0F, 0xCE, 0x9C, 0x59, 0xF2, 0xF4, > > > - 0x26, 0xAB, 0x0F > > > - }, > > > - .len =3D 299 > > > - }, > > > - .result_len =3D 299 > > > -}, > > > -{ > > > - .description =3D "Modular Exponentiation " > > > "(mod=3D448, base=3D50, exp=3D40, res=3D448)", > > > .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > .base =3D { > > > @@ -811,106 +410,6 @@ modex_test_data modex_test_case[] =3D { > > > }, > > > .result_len =3D 448 > > > }, > > > -{ > > > - .description =3D "Modular Exponentiation " > > > - "(mod=3D19, base=3D500, exp=3D35, res=3D19)", > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > - .base =3D { > > > - .data =3D { > > > - 0x42, 0xE5, 0x6F, 0xF7, 0xEF, 0x8F, 0xAB, 0x6F, > > > - 0xF5, 0xE2, 0xD2, 0x97, 0x68, 0x0D, 0x52, 0xDD, > > > - 0x3D, 0x62, 0xC4, 0xC4, 0xDE, 0xD2, 0x07, 0x50, > > > - 0x1B, 0xA9, 0x5F, 0xAE, 0x42, 0xCB, 0x5E, 0x0B, > > > - 0xC0, 0x41, 0xFE, 0xEF, 0x22, 0xA6, 0x4E, 0x35, > > > - 0x80, 0x61, 0x22, 0x92, 0x65, 0x77, 0x45, 0x84, > > > - 0x6C, 0x03, 0x7C, 0xEF, 0xC0, 0x49, 0x31, 0x87, > > > - 0x86, 0x9B, 0x2E, 0x28, 0xA1, 0x55, 0x2D, 0x3C, > > > - 0x68, 0x3D, 0x69, 0x0E, 0x98, 0xD6, 0x40, 0xFD, > > > - 0x0B, 0x4C, 0x5F, 0xC7, 0x95, 0xF1, 0x53, 0x7C, > > > - 0xCC, 0x12, 0x3F, 0x8C, 0x7A, 0x24, 0x73, 0xE7, > > > - 0x33, 0x20, 0xBD, 0x0C, 0xD2, 0x9C, 0x12, 0x20, > > > - 0xC0, 0xC0, 0xA9, 0x16, 0x7E, 0x6B, 0x1D, 0x1F, > > > - 0xFE, 0x63, 0x8A, 0x22, 0x75, 0xDC, 0xF0, 0x0F, > > > - 0x8E, 0xA4, 0x3C, 0xE3, 0x6B, 0xFA, 0x46, 0xBA, > > > - 0xEB, 0x91, 0x31, 0x9D, 0x34, 0xED, 0xA0, 0xA6, > > > - 0xA3, 0xAB, 0xA5, 0x2A, 0x10, 0x30, 0xF4, 0x6F, > > > - 0x80, 0x25, 0xB0, 0xF5, 0x56, 0x76, 0xD3, 0xC5, > > > - 0x10, 0x92, 0xCD, 0xEA, 0xC3, 0x9C, 0x52, 0x96, > > > - 0xF1, 0xBD, 0x42, 0x53, 0xF3, 0xA9, 0x1F, 0xCB, > > > - 0x53, 0x45, 0xF1, 0xF6, 0x5F, 0x98, 0xFC, 0x13, > > > - 0xC9, 0xA8, 0x44, 0xC6, 0xD0, 0x78, 0xB6, 0x39, > > > - 0x93, 0x02, 0xC6, 0xC9, 0x0F, 0xAF, 0xF9, 0x6D, > > > - 0x91, 0x35, 0xC9, 0x26, 0x73, 0x11, 0xEB, 0xEE, > > > - 0x52, 0x61, 0x6C, 0xC0, 0x7F, 0xFD, 0xD0, 0x77, > > > - 0x9F, 0xC6, 0x0A, 0x05, 0x1B, 0x90, 0x61, 0x54, > > > - 0x61, 0xFF, 0x1E, 0xBA, 0x1D, 0x2F, 0x25, 0xE9, > > > - 0x85, 0x4C, 0xBA, 0xEF, 0x99, 0x95, 0x3C, 0xBB, > > > - 0xA9, 0xCF, 0x0D, 0xBF, 0x2C, 0x86, 0xB0, 0x59, > > > - 0xAA, 0x83, 0x29, 0x32, 0x24, 0x28, 0xC8, 0x53, > > > - 0x28, 0x4C, 0xEB, 0x08, 0xFF, 0xC6, 0x25, 0xB7, > > > - 0xFF, 0x18, 0xB0, 0x2C, 0xDD, 0xAE, 0xFB, 0xDB, > > > - 0x54, 0xA2, 0x92, 0x27, 0x15, 0x0D, 0x6B, 0x50, > > > - 0xFB, 0xEA, 0x2C, 0x1C, 0x6F, 0x91, 0x3C, 0x50, > > > - 0x5A, 0xD8, 0x9B, 0x33, 0xED, 0x51, 0x5D, 0x7C, > > > - 0x37, 0x01, 0xEF, 0x09, 0xEA, 0x59, 0x56, 0x8A, > > > - 0x67, 0x21, 0x8C, 0x25, 0x00, 0x33, 0x24, 0x31, > > > - 0xCB, 0xAA, 0x5A, 0xA4, 0xB1, 0x84, 0xDD, 0x89, > > > - 0x3A, 0xFA, 0xD8, 0xAB, 0xEE, 0x3E, 0xC0, 0x0D, > > > - 0xDA, 0x2C, 0x2A, 0x75, 0x13, 0xD7, 0x49, 0x5E, > > > - 0x28, 0x2C, 0x24, 0xC6, 0x1E, 0xA0, 0xB3, 0x70, > > > - 0xAD, 0x45, 0x8A, 0xF2, 0xD9, 0x38, 0x69, 0xD5, > > > - 0x53, 0x30, 0xD8, 0x09, 0x09, 0xDE, 0x1F, 0x6C, > > > - 0x36, 0x82, 0xD5, 0xEC, 0xA7, 0x7E, 0x37, 0x5F, > > > - 0x7D, 0xF2, 0x85, 0x85, 0xF9, 0x0A, 0xC1, 0x13, > > > - 0x86, 0x3C, 0xCD, 0xFE, 0x44, 0x46, 0x57, 0x5E, > > > - 0x67, 0x39, 0x9D, 0x65, 0x74, 0xB9, 0x13, 0x5A, > > > - 0x05, 0xC1, 0xEA, 0xB5, 0x10, 0x1D, 0x66, 0xFF, > > > - 0xA0, 0x3D, 0x47, 0x27, 0x15, 0x66, 0x52, 0x19, > > > - 0xFA, 0x95, 0xD0, 0x03, 0x67, 0xA8, 0x89, 0xAA, > > > - 0x68, 0x04, 0x5F, 0xC4, 0x57, 0x1F, 0x6C, 0xF7, > > > - 0xD2, 0xE2, 0xA3, 0xF3, 0x96, 0x70, 0x86, 0xC6, > > > - 0xCB, 0x3D, 0x52, 0x66, 0x79, 0xED, 0xE6, 0x35, > > > - 0x0A, 0xE8, 0xA8, 0x5A, 0xED, 0x41, 0xB0, 0xF0, > > > - 0x89, 0xCC, 0x20, 0xDA, 0xB7, 0x48, 0x44, 0x64, > > > - 0x69, 0xC9, 0x43, 0xE2, 0xBD, 0xD1, 0x17, 0xCF, > > > - 0x25, 0x7C, 0x92, 0x0B, 0xFC, 0x71, 0x46, 0x67, > > > - 0x1F, 0xF4, 0xA7, 0xFF, 0xD8, 0xA4, 0x5F, 0x4A, > > > - 0x8A, 0x45, 0xBE, 0xDD, 0x89, 0xE2, 0x2A, 0xA7, > > > - 0xBC, 0xE9, 0x84, 0x53, 0x9D, 0xF4, 0x39, 0xB7, > > > - 0xDB, 0x3A, 0x17, 0xF7, 0x27, 0x39, 0xDF, 0x8A, > > > - 0xF0, 0x72, 0xD6, 0x23, 0x1B, 0x1C, 0xD9, 0x48, > > > - 0xF4, 0x2E, 0x54, 0xA3 > > > - }, > > > - .len =3D 500 > > > - }, > > > - .exponent =3D { > > > - .data =3D { > > > - 0xE7, 0xF1, 0x97, 0x29, 0x62, 0x0B, 0x99, 0x89, > > > - 0x99, 0xC1, 0x63, 0xA2, 0xB7, 0x29, 0xAD, 0x0E, > > > - 0x84, 0x3B, 0x86, 0x82, 0xC4, 0xDD, 0xC4, 0xE2, > > > - 0xA7, 0xD4, 0xBA, 0x91, 0x2C, 0xB5, 0xD6, 0xD4, > > > - 0x74, 0x1D, 0xE1 > > > - }, > > > - .len =3D 35 > > > - }, > > > - .reminder =3D { > > > - .data =3D { > > > - 0x67, 0x9F, 0xF7, 0x57, 0xD7, 0xF8, 0xF8, 0x90, > > > - 0x4E, 0xB5, 0x34, 0xE8, 0xAF, 0x14, 0xC6, 0x94, > > > - 0x5F, 0xA1, 0x03 > > > - }, > > > - .len =3D 19 > > > - }, > > > - .modulus =3D { > > > - .data =3D { > > > - 0x9C, 0xE7, 0xE7, 0x14, 0x6E, 0x07, 0x71, 0xD2, > > > - 0xD1, 0xB3, 0x59, 0x9B, 0x63, 0xDB, 0x58, 0x8D, > > > - 0x5E, 0x84, 0xA0 > > > - }, > > > - .len =3D 19 > > > - }, > > > - .result_len =3D 19 > > > -} > > > }; > > > > > > static const struct > > > -- > > > 2.13.6