From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 1418EA034C; Wed, 23 Feb 2022 15:29:07 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9646341226; Wed, 23 Feb 2022 15:29:06 +0100 (CET) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mails.dpdk.org (Postfix) with ESMTP id 241CA411B2 for ; Wed, 23 Feb 2022 15:29:04 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1645626545; x=1677162545; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=+cAQUZKWEHk/Q0dJBx+yyD/CTUcQfJuvQClk59k6vBE=; b=DwAOW/0FFmIWJZBdNbTKKQxAU69+MkrhTPIhiDXdA3JyF8mvfa0S93eg PIGRSVfh4mgylwGh4e4i9493vr5K1SAV5B2wf/0OzGeeJYH+a70zQL8QW LRgbQ9ZdP5ki1Mvp86PeJ8T5ivJQEm3xsAclX3fy/3Pj5+/5Atir8GDxy LMjVANo7ylC5yiTafhPlLaQlGuk/takgb9WUtKk7W+r7hiJkF2Ot1q7QQ C1YgJL3NluF/3DAla2trxZO4EcXY41Dn9jUXyFORwkGQ6RbsKL80HTIZ3 GeKD5mUGiXzLKUlrRQ8L7lrDWR9+RLzxOvf3UVlgIeObkzrLso7Evdfw4 A==; X-IronPort-AV: E=McAfee;i="6200,9189,10266"; a="232595543" X-IronPort-AV: E=Sophos;i="5.88,391,1635231600"; d="scan'208";a="232595543" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Feb 2022 06:29:04 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,391,1635231600"; d="scan'208";a="505931943" Received: from fmsmsx604.amr.corp.intel.com ([10.18.126.84]) by orsmga002.jf.intel.com with ESMTP; 23 Feb 2022 06:29:02 -0800 Received: from fmsmsx608.amr.corp.intel.com (10.18.126.88) by fmsmsx604.amr.corp.intel.com (10.18.126.84) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Wed, 23 Feb 2022 06:29:01 -0800 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx608.amr.corp.intel.com (10.18.126.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20 via Frontend Transport; Wed, 23 Feb 2022 06:29:01 -0800 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.104) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Wed, 23 Feb 2022 06:29:01 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KPFI4f7+gmo+Nuezbu7jz07Va3BLaUWfvGkzGKPLesWaZRkn7V7nqNqAz7beDw8DE2riAKUK+Zyia7uZQ10s4/giCR3NJa4YxBryZz0Xha76qb3b5r5ysS3WUxNWTE31gPvdG58l0uiY770Z9ziL9Cmr63svc3D9N+hf8Do2h5PON7k/DHYfvpPL1ZqKLy5ZxDrCCH4e13ss8SzeuUAbbl+C0JnUEQeG6hAHYEl7ggz7DFhCaoubAaExV8cnnkp38sCjvxEf2EePRwEytwELOtlDKk8aeM9OX2TrAixdqX6yQBXElpuRk5ZyqNeAQK7RWWdi6Y5c1S42h4isgVbqQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AQ1TyoJIZF8ciAHs5IXVoac0UVYWCMgOZxoJnli9TIM=; b=HjkXtHsUvofaQX8Ce9DreyhY+5/MgUDtrTqT76AnSAh7i3IsP+NymQzYocnWiL58MJHrV/pK2KCPJyGxn2fS5v2wN0E0kV3921QtnwW+XoCBU+m3brKzNUIB2y0mx821CTO/1QsxgaWqHAP9CsF6QEV/XFkzkF+y0HxEJ1+Z8tl3WVfQ4jFArTN0QmOLD+fxXxC/CSspl2karSRUWiVEgmuhS4WaQFykjo5waEt9111ei5dB3rVFw1n/qlo6gnqSERKyGQ0T19Hud4jzJjxDz4Ig/bJfCKuwIG0HaQC5JO2NDQ0DIvloZXZXU++zycg+hJGi4uBWRUjsGrXTipOqmw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW5PR11MB5809.namprd11.prod.outlook.com (2603:10b6:303:197::6) by MN2PR11MB4416.namprd11.prod.outlook.com (2603:10b6:208:188::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Wed, 23 Feb 2022 14:28:56 +0000 Received: from MW5PR11MB5809.namprd11.prod.outlook.com ([fe80::a599:b969:5072:71cb]) by MW5PR11MB5809.namprd11.prod.outlook.com ([fe80::a599:b969:5072:71cb%4]) with mapi id 15.20.5017.023; Wed, 23 Feb 2022 14:28:56 +0000 From: "Zhang, Roy Fan" To: Anoob Joseph , "Kusztal, ArkadiuszX" CC: Akhil Goyal , Umesh Kartha , Ramkumar Balu , "dev@dpdk.org" Subject: RE: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus cases Thread-Topic: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus cases Thread-Index: AQHYHNpJmSHK8x67xkO9nSmucmF7iqyhASyAgAAEk+CAADMgAIAAEJIA Date: Wed, 23 Feb 2022 14:28:56 +0000 Message-ID: References: <20220208105437.15455-1-arkadiuszx.kusztal@intel.com> In-Reply-To: Accept-Language: zh-Hans-HK, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.6.200.16 dlp-reaction: no-action dlp-product: dlpe-windows authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: cc63ebb6-6a44-435f-417b-08d9f6d8d30c x-ms-traffictypediagnostic: MN2PR11MB4416:EE_ x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW5PR11MB5809.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(110136005)(76116006)(54906003)(6636002)(66946007)(66476007)(64756008)(8676002)(38100700002)(4326008)(66446008)(66556008)(82960400001)(33656002)(8936002)(316002)(122000001)(5660300002)(508600001)(71200400001)(52536014)(7696005)(6506007)(53546011)(55016003)(9686003)(86362001)(83380400001)(2906002)(38070700005)(30864003)(26005)(186003)(579004)(559001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?m5HpkVgbDiIxJd48qsDFxsrjnmv/lxByHrrESGIAdCBP/g14NmUuOyuS?= =?Windows-1252?Q?o3lKnQoZwm0j+zxcQuyZy5hbwLE6r6fw1RoVMjUvAnYQafLgMaHHYNBq?= =?Windows-1252?Q?jtO4jiYXhnI8de/TLs5QGNygTw746dT0ZSMmW7tI06QbiodUd4XLbLgk?= =?Windows-1252?Q?bWEzsCPcUBnWkEVrJvUymizSafb/hQFmaB8VDQfTaIvZrYhifs9elVEn?= =?Windows-1252?Q?LUXhFzUZbZxvbwySpffYIz1zQex3lsa7vt8yJLRsPFC1gnj94krSD8lA?= =?Windows-1252?Q?CxAHQ4qRm13xBdQJLsTA5dn0lzFsjdH0qjPCk4JMvJSpxXyOiH1/9zAm?= =?Windows-1252?Q?9mqtFTSa4X7NC+cl8Jdfyhgwm5siPJeFjvaFYViGhcZRj3PUw0LckrEG?= =?Windows-1252?Q?NAN0vCiRR0EIpeR0+KCbr9XE3IVtwuc5N75rosTidX9I7Q1UoqYgfsVy?= =?Windows-1252?Q?7O1Fp26URYghe8pT7WFAjtfue53qEOdhJR0Lfl4yqLaRqdCnnMvZsQE8?= =?Windows-1252?Q?OhMvd6GueusmRFC4x0GRbdpvwt82C6wdY/syTOxqdhptiskGMDGmtYGy?= =?Windows-1252?Q?1OprHeoFBkhzjq4IfaeYVRh9DFXVA2kdz7OcR7AlxcCKWfrJcgMpGvpL?= =?Windows-1252?Q?v6aeZ7zW29KFZ8K8nyvItPCadrOaW+cUHwB243s8FI9hxIJWIhHAdpge?= =?Windows-1252?Q?DARr/SundUd8uSEiZ5PDNEwGk4UdBCsSe5gGOSJW2UOiVkg8zg5OCoZn?= =?Windows-1252?Q?bdCFbYyts1Q37WMRZ5rcFBWguTvMes7qnRv8LIRa46t7Dhng7jxXh4MW?= =?Windows-1252?Q?3sHuEg6fAu/+2tSwRz6VbD4EGHKSUlqSRNuc/yEQt5Vaunyo1URe2GpJ?= =?Windows-1252?Q?DR45fEDfVVuGRGYE2omXArBnIVEjtT81TRFxP5WQejohiUV0zGlZNnYq?= =?Windows-1252?Q?WWqFRUsRsnWtg3sPiDeJoctuWktiAAFU+NoEFoLQz0Ywb2aiOa8JYLZF?= =?Windows-1252?Q?jUE2B2/A5lZTiyDxZPLrrRyNsQCirFlYr09564NpC+3Km7dmGEGGuScT?= =?Windows-1252?Q?plC+zGfoG6CABh2Ddck05XHC1WLkndfwvRiPUsGrX2z8YnC4zXLn8f62?= =?Windows-1252?Q?It+x2IwRmBicbtuq1nTPIIMMpiuWOKOrnuLbAWruCYX2ypyS53/3Wq0q?= =?Windows-1252?Q?gEtwwZMeI9ySxqyU96Sc+UjMHdSPKsc2UGf3XJQyH7lDjgbjWTVstqd4?= =?Windows-1252?Q?h1+687PrQBiCan0JgyYjeVQB3AbON/4mFWzDOcMa+x7uMoV+iMs0qucq?= =?Windows-1252?Q?z/zJBE+V6MZmUcjOOAxWx1ikbxcXevvtotWbyIAEyiiPL49WNl9GOyF7?= =?Windows-1252?Q?KBnyO/9fpoevQtZOjoDLj/0YGBeMOK7w1TsZgCbwCNp8GBODIdI9BJu5?= =?Windows-1252?Q?slzklLRrwGTuJNq590H0QrpxB9UP4RfcdN+RD+/HboZzO+WliXtveDxe?= =?Windows-1252?Q?0CzXx8CtB0F6GTw/RvJMAp7BywBl/sEnEarxGfPpejeEzPlnigedPHjT?= =?Windows-1252?Q?m7bTfEelFBNat2072Ph9diCKkRvAVK4uWibaWSWpNqvMfBjfl47xyt6n?= =?Windows-1252?Q?MsJID5uYSNelc3jT3cEnyv/9+EZ3uWYROc3CDYCs4/IcpnlPjZCIYK+b?= =?Windows-1252?Q?05KEj3b29NjwDPXlxHK86PZFK1l2tC9oplyD/DvWK+kJQx+lf3azkU2E?= =?Windows-1252?Q?yekfahWOrX2aFX9fvNQ=3D?= Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW5PR11MB5809.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: cc63ebb6-6a44-435f-417b-08d9f6d8d30c X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Feb 2022 14:28:56.2706 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: HBAWoCyr7JOepc/PdkFVG85/K/+Tf3zAUj2dDbgZlpTqvojUM6PBgCJReQ3j/ZTd0eoF6xAINqtKxlLCJD75nw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4416 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Anoob, Make sense. Will do ASAP. Regards, Fan > -----Original Message----- > From: Anoob Joseph > Sent: Wednesday, February 23, 2022 1:29 PM > To: Zhang, Roy Fan ; Kusztal, ArkadiuszX > > Cc: Akhil Goyal ; Umesh Kartha > ; Ramkumar Balu ; > dev@dpdk.org > Subject: RE: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus > cases >=20 > Hi Fan, >=20 > Is it possible to just skip these for QAT? You can add a driver name chec= k and > skip the specific cases. Later, when we add capability, then this check c= an be > replaced with capability check. >=20 > If we remove the vectors, then a new PMD having the same issues as you > reported may not declare the capability and would still pass the DPDK UTs= . > And then any application which attempts some of these could hit some > issues. Isn't it better to have these tested by DPDK UTs? Isn't that the = better > solution overall? >=20 > Thanks, > Anoob >=20 > > -----Original Message----- > > From: Zhang, Roy Fan > > Sent: Wednesday, February 23, 2022 4:05 PM > > To: Anoob Joseph ; Kusztal, ArkadiuszX > > > > Cc: Akhil Goyal ; Umesh Kartha > > ; Ramkumar Balu ; > > dev@dpdk.org > > Subject: RE: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus > > cases > > > > Hi Anoob, > > > > You are right QAT doesn't like these test vectors - for the reason Arek > stated > > in the patch. > > We are in the same page on updating the capability - we already planned > for > > next release. > > Since you also agree these cases are not useful - can we do both instea= d > > (removing these test vectors in this release and update the capability = in the > > next)? > > > > Regards, > > Fan > > > > > -----Original Message----- > > > From: Anoob Joseph > > > Sent: Wednesday, February 23, 2022 10:09 AM > > > To: Kusztal, ArkadiuszX > > > Cc: Akhil Goyal ; Zhang, Roy Fan > > > ; Umesh Kartha ; > > > Ramkumar Balu ; dev@dpdk.org > > > Subject: RE: [EXT] [PATCH] test/crypto: remove mod exp smaller modulu= s > > > cases > > > > > > Hi Arek, > > > > > > I agree that these cases may not be particularly useful from > > > cryptographic standpoint, but how do we say from what values a PMD > > > "must" support? Are you having some trouble supporting some of these > > > values? Should we consider extending capabilities to help with this > > > rather than just removing the test vectors? > > > > > > Thanks, > > > Anoob > > > > > > > -----Original Message----- > > > > From: Arek Kusztal > > > > Sent: Tuesday, February 8, 2022 4:25 PM > > > > To: dev@dpdk.org > > > > Cc: Akhil Goyal ; roy.fan.zhang@intel.com; Arek > > > > Kusztal > > > > Subject: [EXT] [PATCH] test/crypto: remove mod exp smaller modulus > > > cases > > > > > > > > External Email > > > > > > > > -------------------------------------------------------------------= - > > > > -- Even if mod exp tests cases where modulus is not the biggest > > > > number are mathematically correct and can be computed, > > > > cryptographically it is useless and PMD does not need to support it= . > > > > > > > > Signed-off-by: Arek Kusztal > > > > --- > > > > app/test/test_cryptodev_mod_test_vectors.h | 501 > > > > -------------------------- > > > -- > > > > - > > > > 1 file changed, 501 deletions(-) > > > > > > > > diff --git a/app/test/test_cryptodev_mod_test_vectors.h > > > > b/app/test/test_cryptodev_mod_test_vectors.h > > > > index c66f4b18bc..d108059624 100644 > > > > --- a/app/test/test_cryptodev_mod_test_vectors.h > > > > +++ b/app/test/test_cryptodev_mod_test_vectors.h > > > > @@ -167,141 +167,6 @@ modex_test_data modex_test_case[] =3D { }, = { > > > > .description =3D "Modular Exponentiation " > > > > - "(mod=3D8, base=3D65, exp=3D17, res=3D8)", > > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > > - .base =3D { > > > > - .data =3D { > > > > - 0x25, 0x74, 0x41, 0xCE, 0xFA, 0x5C, 0x07, 0x2A, > > > > - 0xD1, 0x74, 0xF3, 0x3D, 0xE1, 0xCC, 0xC3, 0x18, > > > > - 0x7E, 0x4A, 0x21, 0x9F, 0x97, 0xA3, 0x26, 0x85, > > > > - 0x85, 0xD9, 0x9B, 0xE3, 0xBA, 0xB3, 0x70, 0xC9, > > > > - 0x26, 0x68, 0xE4, 0xB7, 0x4C, 0x88, 0x48, 0xC1, > > > > - 0x6B, 0xC6, 0x3C, 0x00, 0x8C, 0x6B, 0xC6, 0x11, > > > > - 0xD0, 0xD6, 0x61, 0x5D, 0xEC, 0xAA, 0xBA, 0x3B, > > > > - 0x7D, 0xB3, 0x0D, 0x3F, 0xA5, 0x4D, 0xEE, 0xE4, > > > > - 0xAC > > > > - }, > > > > - .len =3D 65 > > > > - }, > > > > - .exponent =3D { > > > > - .data =3D { > > > > - 0x1C, 0x54, 0x2F, 0xCA, 0xDE, 0x4F, 0x17, 0x38, > > > > - 0x69, 0x87, 0xB4, 0xFF, 0x3A, 0x6C, 0x82, 0x70, > > > > - 0x53 > > > > - }, > > > > - .len =3D 17 > > > > - }, > > > > - .reminder =3D { > > > > - .data =3D { > > > > - 0x52, 0x06, 0x1A, 0x35, 0x70, 0x33, 0x78, 0x45 > > > > - }, > > > > - .len =3D 8 > > > > - }, > > > > - .modulus =3D { > > > > - .data =3D { > > > > - 0x6B, 0x6D, 0xFA, 0xCB, 0x09, 0x5D, 0x9C, 0xFD > > > > - }, > > > > - .len =3D 8 > > > > - }, > > > > - .result_len =3D 8 > > > > -}, > > > > -{ > > > > - .description =3D "Modular Exponentiation " > > > > - "(mod=3D100, base=3D150, exp=3D192, res=3D100)", > > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > > - .base =3D { > > > > - .data =3D { > > > > - 0xC1, 0xA1, 0x04, 0xE4, 0x4D, 0x4A, 0xD3, 0x5C, > > > > - 0xB3, 0xD0, 0x16, 0x51, 0xA7, 0xF4, 0x82, 0x6C, > > > > - 0x22, 0xDD, 0x4D, 0xAA, 0x70, 0x30, 0x25, 0xA7, > > > > - 0xFA, 0xA9, 0xF2, 0x20, 0x55, 0x9B, 0xEA, 0x26, > > > > - 0xF6, 0xB5, 0xF8, 0x9C, 0x46, 0x21, 0x85, 0x0E, > > > > - 0x38, 0x73, 0x01, 0xC6, 0x72, 0x67, 0x9B, 0x49, > > > > - 0xCE, 0x48, 0xB7, 0x4A, 0xEE, 0x08, 0x21, 0x26, > > > > - 0xF3, 0x21, 0x77, 0xE7, 0x3C, 0x77, 0xF4, 0x0A, > > > > - 0x82, 0xC8, 0x16, 0x94, 0x6C, 0xBF, 0xA8, 0xD8, > > > > - 0x8B, 0x7D, 0x27, 0x60, 0xAC, 0x06, 0x69, 0x7E, > > > > - 0x46, 0x2C, 0xE2, 0xD1, 0x13, 0x50, 0x7D, 0xCE, > > > > - 0x4D, 0xC4, 0x5D, 0x81, 0xFB, 0x6B, 0x11, 0x4A, > > > > - 0x2D, 0xA2, 0x03, 0x55, 0x77, 0x8C, 0x3D, 0xA1, > > > > - 0xAD, 0xBE, 0x9C, 0x72, 0xE5, 0xA5, 0xFB, 0x49, > > > > - 0x5F, 0x13, 0x48, 0xC7, 0xAC, 0xD1, 0x0F, 0x5E, > > > > - 0xDF, 0x9C, 0xC7, 0xF5, 0x19, 0xFD, 0xC5, 0x77, > > > > - 0x27, 0x8D, 0xC4, 0x1D, 0x90, 0x8C, 0x20, 0x96, > > > > - 0xC8, 0x6A, 0x0D, 0x2F, 0xE2, 0x8B, 0xB0, 0x58, > > > > - 0xF8, 0xC4, 0x31, 0x0A, 0x17, 0x11 > > > > - }, > > > > - .len =3D 150 > > > > - }, > > > > - .exponent =3D { > > > > - .data =3D { > > > > - 0xC6, 0x20, 0x99, 0xD9, 0xBC, 0xE2, 0xAD, 0x74, > > > > - 0x11, 0x6F, 0x74, 0x14, 0x72, 0xB8, 0x09, 0xCB, > > > > - 0x5C, 0x74, 0x11, 0x21, 0x17, 0x84, 0x02, 0xDC, > > > > - 0x70, 0x59, 0x20, 0x79, 0x40, 0x7B, 0x0E, 0x52, > > > > - 0xAD, 0x00, 0x38, 0x4F, 0x5A, 0xE5, 0x0D, 0x28, > > > > - 0xB5, 0xF8, 0xDC, 0x54, 0x92, 0xB2, 0xB0, 0xA8, > > > > - 0xE8, 0x35, 0x1B, 0x63, 0x0D, 0x6A, 0x50, 0x8D, > > > > - 0xE1, 0x3E, 0x7A, 0xDD, 0x42, 0x7A, 0xD0, 0xB4, > > > > - 0x9D, 0x63, 0x36, 0x03, 0xC0, 0x9B, 0xA0, 0x91, > > > > - 0x8B, 0xBC, 0x45, 0x53, 0x93, 0x2C, 0xFC, 0xDD, > > > > - 0x4F, 0xBD, 0x96, 0x0B, 0x63, 0xEB, 0xEF, 0x50, > > > > - 0xAC, 0x99, 0x45, 0xA7, 0x0D, 0xC6, 0xEA, 0x98, > > > > - 0xBC, 0xD7, 0x63, 0x56, 0x8C, 0x75, 0x68, 0xAE, > > > > - 0xF0, 0xB4, 0x66, 0xA0, 0x4D, 0xC5, 0x71, 0xB9, > > > > - 0x4E, 0xCB, 0xF6, 0xCA, 0xC9, 0x1B, 0x3B, 0x55, > > > > - 0x91, 0x39, 0x25, 0xBD, 0x98, 0xAA, 0xDA, 0xF2, > > > > - 0x8A, 0xCB, 0x8E, 0x56, 0x09, 0xBF, 0xC4, 0x1D, > > > > - 0xFA, 0x23, 0x48, 0xF6, 0x9A, 0xD2, 0xD3, 0x2B, > > > > - 0xED, 0x60, 0x9B, 0x4B, 0x63, 0xD8, 0x8C, 0x6A, > > > > - 0x28, 0xA3, 0x4C, 0x85, 0x43, 0x4D, 0x5C, 0x4A, > > > > - 0xA7, 0xA9, 0x9F, 0x7E, 0x13, 0x5B, 0x36, 0xED, > > > > - 0xD9, 0x53, 0xBE, 0x12, 0xFF, 0x17, 0x9F, 0x70, > > > > - 0xA4, 0xD2, 0x42, 0x72, 0x70, 0x51, 0x70, 0x3F, > > > > - 0x5A, 0xBA, 0x33, 0x0E, 0xBB, 0x4C, 0xA0, 0x4A > > > > - }, > > > > - .len =3D 192 > > > > - }, > > > > - .reminder =3D { > > > > - .data =3D { > > > > - 0x07, 0x5E, 0x28, 0x4F, 0xD1, 0xEA, 0x5C, 0x1D, > > > > - 0xF8, 0xBF, 0x29, 0xF0, 0x63, 0xCC, 0xF7, 0x6D, > > > > - 0x99, 0x67, 0xCE, 0xE3, 0x05, 0x16, 0x16, 0x8C, > > > > - 0x3A, 0x07, 0xC0, 0x63, 0x70, 0xB9, 0x1A, 0x24, > > > > - 0xED, 0xE9, 0xF0, 0xEE, 0xD9, 0xAB, 0x18, 0xD4, > > > > - 0x59, 0xB4, 0xD2, 0x77, 0x44, 0x94, 0x72, 0xFE, > > > > - 0x19, 0x26, 0x50, 0x47, 0x77, 0xAD, 0x0A, 0x45, > > > > - 0x76, 0x4B, 0x22, 0xDB, 0x05, 0x13, 0x67, 0x40, > > > > - 0x9A, 0x36, 0x6C, 0x5E, 0xE8, 0xED, 0x40, 0x60, > > > > - 0x86, 0x40, 0x2F, 0x30, 0x9E, 0x4B, 0x61, 0x73, > > > > - 0x2E, 0x76, 0x8A, 0xB0, 0x49, 0x04, 0x1A, 0x82, > > > > - 0xB7, 0xEF, 0xB2, 0xB5, 0xB4, 0xE0, 0x87, 0xF0, > > > > - 0xB4, 0x53, 0xB2, 0xBE > > > > - }, > > > > - .len =3D 100 > > > > - }, > > > > - .modulus =3D { > > > > - .data =3D { > > > > - 0x54, 0x58, 0x5C, 0xBA, 0xAE, 0xC1, 0xB4, 0x46, > > > > - 0x50, 0xAF, 0xD0, 0xA6, 0x03, 0x9D, 0x74, 0x84, > > > > - 0x6F, 0x89, 0x07, 0xA6, 0x63, 0xE7, 0x34, 0xB2, > > > > - 0x55, 0x0E, 0xD5, 0x42, 0xC9, 0xBF, 0xD1, 0x89, > > > > - 0x54, 0x0B, 0x76, 0xF7, 0x0E, 0xA1, 0x42, 0x02, > > > > - 0x72, 0xDC, 0x28, 0x5A, 0x68, 0x10, 0xA0, 0x84, > > > > - 0xA4, 0x72, 0x4D, 0x40, 0x69, 0xBC, 0x18, 0xC9, > > > > - 0x92, 0x69, 0xB8, 0x52, 0x2A, 0xB1, 0xA3, 0x43, > > > > - 0x80, 0xA9, 0x55, 0x78, 0xEA, 0xD9, 0x54, 0xF4, > > > > - 0x3A, 0xDD, 0x24, 0x4E, 0x22, 0x9D, 0x89, 0x40, > > > > - 0x8F, 0x50, 0xA5, 0xF5, 0x0F, 0xFA, 0x38, 0xBB, > > > > - 0xE8, 0xD7, 0x21, 0x6B, 0xEA, 0xB1, 0x28, 0x48, > > > > - 0xEB, 0x75, 0xB1, 0xC7 > > > > - }, > > > > - .len =3D 100 > > > > - }, > > > > - .result_len =3D 100 > > > > -}, > > > > -{ > > > > - .description =3D "Modular Exponentiation " > > > > "(mod=3D255, base=3D20, exp=3D10, res=3D255)", > > > > .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > > .base =3D { > > > > @@ -397,272 +262,6 @@ modex_test_data modex_test_case[] =3D { }, = { > > > > .description =3D "Modular Exponentiation " > > > > - "(mod=3D112, base=3D257, exp=3D43, res=3D112)", > > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > > - .base =3D { > > > > - .data =3D { > > > > - 0x53, 0x63, 0xB0, 0x3A, 0x30, 0xDE, 0x07, 0xBC, > > > > - 0xE4, 0x4B, 0x52, 0x37, 0x9C, 0xD8, 0x5A, 0xCD, > > > > - 0x03, 0xE1, 0xEA, 0x6D, 0xDE, 0x4C, 0x19, 0xE6, > > > > - 0xA2, 0x0F, 0xAE, 0x56, 0xCD, 0xB2, 0xB6, 0x5B, > > > > - 0x31, 0xF5, 0x41, 0x48, 0x8D, 0xA2, 0xC7, 0x0C, > > > > - 0x19, 0x32, 0x6D, 0x58, 0x10, 0xD5, 0xF0, 0x64, > > > > - 0xF9, 0xF5, 0xD7, 0xFE, 0x37, 0x4A, 0xD8, 0xE3, > > > > - 0xBF, 0xDF, 0xCB, 0x45, 0xD5, 0xBF, 0xB9, 0x2A, > > > > - 0x60, 0xF8, 0x52, 0xB0, 0xB5, 0x22, 0x76, 0xBD, > > > > - 0xD3, 0x0D, 0xD4, 0xE1, 0x42, 0xC4, 0x8C, 0x47, > > > > - 0x2D, 0x04, 0x25, 0x1B, 0xFB, 0x21, 0xFD, 0x80, > > > > - 0xC0, 0xCE, 0x9D, 0x32, 0x76, 0x8E, 0x18, 0x28, > > > > - 0xDC, 0x0F, 0x44, 0x37, 0xF8, 0x61, 0x45, 0x93, > > > > - 0xD3, 0x62, 0x21, 0xEE, 0x8B, 0x89, 0x8B, 0xAF, > > > > - 0x8B, 0xE9, 0xA5, 0xD2, 0x00, 0xF5, 0xFF, 0xE6, > > > > - 0xE0, 0x56, 0x9D, 0x41, 0x13, 0xBC, 0xD6, 0x6E, > > > > - 0xC9, 0xE8, 0xE8, 0xC7, 0x61, 0x00, 0x7D, 0x91, > > > > - 0x59, 0xAC, 0x6A, 0x24, 0x86, 0x3C, 0x50, 0xFB, > > > > - 0x49, 0xC4, 0xB9, 0x41, 0xCD, 0xF0, 0xD9, 0xE7, > > > > - 0xE1, 0x54, 0x3F, 0x17, 0x3B, 0xC7, 0x12, 0x20, > > > > - 0x6E, 0xC5, 0x80, 0x11, 0xA5, 0x78, 0x72, 0xCA, > > > > - 0xBC, 0x90, 0xB7, 0xC5, 0xFF, 0x78, 0xE5, 0x71, > > > > - 0x62, 0x4C, 0xCC, 0x6C, 0xEA, 0x76, 0xE3, 0xB6, > > > > - 0x00, 0x54, 0x31, 0x72, 0x5A, 0xFE, 0x14, 0xC3, > > > > - 0x60, 0x3A, 0x79, 0x97, 0x26, 0x87, 0x69, 0x8D, > > > > - 0x44, 0x8E, 0x8B, 0xE0, 0xBC, 0x5C, 0x9F, 0xDE, > > > > - 0xD0, 0x90, 0xA2, 0x85, 0xC8, 0x3E, 0x7E, 0xA0, > > > > - 0x42, 0xE2, 0x3B, 0xEE, 0x0C, 0x59, 0x1E, 0x72, > > > > - 0x62, 0xA5, 0xEE, 0x20, 0xE0, 0xFE, 0x0D, 0xD3, > > > > - 0x9F, 0xA9, 0x84, 0xBC, 0xD0, 0x6E, 0x5E, 0xC2, > > > > - 0x0B, 0xF2, 0xAE, 0xB6, 0xE6, 0xC6, 0x88, 0xF9, > > > > - 0x51, 0xF8, 0x02, 0x08, 0xC6, 0x99, 0x73, 0xF2, > > > > - 0x36 > > > > - }, > > > > - .len =3D 257 > > > > - }, > > > > - .exponent =3D { > > > > - .data =3D { > > > > - 0xCA, 0x5C, 0x73, 0xF7, 0x8B, 0x1F, 0x95, 0xE4, > > > > - 0x0E, 0x9B, 0x47, 0xDC, 0x03, 0x96, 0x75, 0xB4, > > > > - 0x48, 0x74, 0x73, 0xBE, 0xF8, 0x92, 0x80, 0xE4, > > > > - 0x93, 0x5D, 0x87, 0x7D, 0x74, 0xF7, 0x45, 0xEF, > > > > - 0x8E, 0x53, 0x9C, 0x03, 0xB0, 0xD6, 0xF3, 0xBF, > > > > - 0x86, 0xB2, 0xCD > > > > - }, > > > > - .len =3D 43 > > > > - }, > > > > - .reminder =3D { > > > > - .data =3D { > > > > - 0x01, 0x0E, 0x8C, 0x1B, 0x19, 0xF6, 0xB0, 0x0D, > > > > - 0x8D, 0xFF, 0x12, 0x74, 0xF0, 0xD0, 0xB1, 0xA2, > > > > - 0x49, 0xA4, 0xA3, 0x9C, 0x4D, 0xFA, 0xA7, 0xB7, > > > > - 0x6E, 0x45, 0xCC, 0x0D, 0x75, 0xC7, 0xF7, 0x99, > > > > - 0x1F, 0x01, 0x44, 0x7B, 0xF2, 0xF9, 0x73, 0x67, > > > > - 0x75, 0xD9, 0x4C, 0x2F, 0xA9, 0xB4, 0x59, 0x9E, > > > > - 0xF9, 0x2C, 0xB9, 0x14, 0x5D, 0x5C, 0x18, 0x72, > > > > - 0xEC, 0x27, 0x1A, 0x2D, 0xFB, 0xDA, 0xEB, 0x2F, > > > > - 0x98, 0xA9, 0xC2, 0x01, 0x75, 0x7A, 0x27, 0x07, > > > > - 0x94, 0x71, 0x3F, 0x90, 0xDF, 0x56, 0x6F, 0x23, > > > > - 0x47, 0x12, 0xAD, 0x32, 0x7A, 0xBC, 0x91, 0x36, > > > > - 0x43, 0xD2, 0x88, 0x3D, 0x2C, 0x31, 0x85, 0xE6, > > > > - 0x22, 0x2E, 0xCF, 0x53, 0x87, 0x0D, 0xAE, 0x72, > > > > - 0x31, 0x21, 0x52, 0x0C, 0xDF, 0xAC, 0xEA, 0x57 > > > > - }, > > > > - .len =3D 112 > > > > - }, > > > > - .modulus =3D { > > > > - .data =3D { > > > > - 0x20, 0x7E, 0x78, 0xFC, 0x54, 0x40, 0x47, 0xED, > > > > - 0x7B, 0x26, 0x21, 0x94, 0x6D, 0x9C, 0xDC, 0xB7, > > > > - 0x7C, 0xB8, 0xDE, 0x57, 0x3C, 0x64, 0x47, 0x50, > > > > - 0xDB, 0x92, 0x0A, 0x5A, 0x85, 0x77, 0x84, 0xE3, > > > > - 0xC7, 0xEA, 0x33, 0xA2, 0x63, 0xDA, 0x63, 0xE3, > > > > - 0xDF, 0x07, 0x32, 0x85, 0xDC, 0xC3, 0xF0, 0x7C, > > > > - 0xD8, 0x44, 0xC4, 0xDE, 0x2C, 0xB7, 0x91, 0xAE, > > > > - 0xCD, 0xA2, 0xB3, 0x6B, 0x43, 0x04, 0x88, 0xBE, > > > > - 0x3B, 0x50, 0xE1, 0x88, 0xD0, 0x20, 0x04, 0x36, > > > > - 0xA4, 0xA0, 0xB0, 0x3B, 0x61, 0x9B, 0x83, 0xDB, > > > > - 0x05, 0x77, 0x5A, 0x5E, 0x87, 0xA6, 0xBE, 0x6A, > > > > - 0x2A, 0xB4, 0x30, 0x10, 0x8D, 0x3B, 0xBC, 0x84, > > > > - 0x9E, 0xB2, 0x21, 0x7E, 0xAC, 0x67, 0x94, 0x9F, > > > > - 0xF1, 0x32, 0x3C, 0xF0, 0x94, 0x83, 0xF8, 0x19 > > > > - }, > > > > - .len =3D 112 > > > > - }, > > > > - .result_len =3D 112 > > > > -}, > > > > -{ > > > > - .description =3D "Modular Exponentiation " > > > > - "(mod=3D299, base=3D240, exp=3D321, res=3D299)", > > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > > - .base =3D { > > > > - .data =3D { > > > > - 0xAF, 0xE4, 0xCF, 0x9F, 0x7C, 0x20, 0x72, 0xE9, > > > > - 0x50, 0x2E, 0xE5, 0xE4, 0xEF, 0x80, 0x28, 0xB3, > > > > - 0x3A, 0x92, 0xAC, 0xCD, 0xF1, 0x6B, 0x7D, 0x83, > > > > - 0x78, 0x4E, 0x9B, 0x30, 0x1E, 0xF4, 0x11, 0x15, > > > > - 0x49, 0xAC, 0x06, 0xA2, 0x92, 0xB9, 0x91, 0x1B, > > > > - 0xE8, 0xC8, 0xBC, 0x8A, 0x6F, 0xB2, 0xB8, 0x7C, > > > > - 0xC5, 0xD3, 0x68, 0x60, 0xA4, 0x37, 0x7A, 0x6E, > > > > - 0x3A, 0x1C, 0xAE, 0xAC, 0x70, 0x7B, 0x03, 0xE0, > > > > - 0xDC, 0x7D, 0x51, 0x2E, 0x04, 0xC1, 0xD4, 0xA8, > > > > - 0x5A, 0xE1, 0xE8, 0xAD, 0x83, 0x0C, 0x0C, 0x2D, > > > > - 0x93, 0x8A, 0x07, 0x25, 0xC6, 0xE1, 0xAB, 0xD7, > > > > - 0x2F, 0xC4, 0x14, 0x2E, 0x68, 0x89, 0xA7, 0xEA, > > > > - 0x4E, 0x7B, 0xC4, 0x05, 0xD4, 0xB7, 0xC1, 0x9B, > > > > - 0x9D, 0x8D, 0x58, 0x33, 0xE3, 0xB0, 0x58, 0xD8, > > > > - 0xCF, 0x6D, 0xA9, 0xC6, 0x96, 0xE3, 0x6E, 0xAA, > > > > - 0x23, 0x17, 0x19, 0x74, 0xE0, 0x7B, 0x50, 0x7A, > > > > - 0x57, 0x49, 0xFD, 0xFA, 0x3E, 0x7D, 0xF9, 0xB6, > > > > - 0x30, 0x5F, 0x1C, 0xE4, 0x5F, 0xC7, 0x3D, 0x5B, > > > > - 0x9E, 0xF5, 0xB6, 0x2F, 0xEA, 0xCF, 0x31, 0x35, > > > > - 0xC0, 0x60, 0xDE, 0x18, 0xC5, 0x0D, 0xBB, 0xC5, > > > > - 0xD1, 0x1D, 0x25, 0x7C, 0x8C, 0x35, 0x8A, 0x71, > > > > - 0xA8, 0x01, 0x9E, 0xEA, 0x8F, 0xD4, 0x5D, 0x52, > > > > - 0x86, 0xB7, 0x11, 0xC8, 0xF2, 0x97, 0xD0, 0x73, > > > > - 0x7C, 0xAB, 0xBB, 0xF4, 0x38, 0x4E, 0x48, 0xB5, > > > > - 0x70, 0x35, 0x2A, 0xC5, 0x14, 0x86, 0x2E, 0x64, > > > > - 0x91, 0x32, 0x37, 0x5E, 0x1A, 0x00, 0xAC, 0xF1, > > > > - 0xFC, 0x36, 0xEA, 0x7F, 0x50, 0xAF, 0x02, 0xEC, > > > > - 0x06, 0xE8, 0x55, 0x68, 0x0D, 0x9A, 0x58, 0x4D, > > > > - 0xBD, 0xB9, 0x62, 0x25, 0xAB, 0x94, 0xD7, 0x37, > > > > - 0xAD, 0xB4, 0x9F, 0xB4, 0x3A, 0x07, 0x45, 0x4B > > > > - }, > > > > - .len =3D 240 > > > > - }, > > > > - .exponent =3D { > > > > - .data =3D { > > > > - 0xB1, 0xC2, 0x86, 0xFA, 0xE2, 0xF1, 0x71, 0x9C, > > > > - 0x61, 0x23, 0xAB, 0x37, 0xC6, 0x4F, 0x17, 0xFE, > > > > - 0x4D, 0xAC, 0x11, 0xD4, 0x36, 0xEE, 0xCB, 0xAE, > > > > - 0x46, 0x88, 0xA4, 0x92, 0x20, 0x6D, 0xDC, 0xF1, > > > > - 0xE4, 0x94, 0x72, 0x07, 0x64, 0x84, 0xF4, 0x83, > > > > - 0x31, 0x0C, 0x04, 0xF7, 0x5B, 0x68, 0xE6, 0x7A, > > > > - 0x6C, 0xCD, 0x6C, 0xBF, 0x03, 0x07, 0x5A, 0x91, > > > > - 0x37, 0x3A, 0x73, 0xFF, 0xB2, 0x11, 0x88, 0x39, > > > > - 0x19, 0xEB, 0x1C, 0x0E, 0x45, 0x99, 0xE6, 0x4E, > > > > - 0xE4, 0xB1, 0x57, 0xBE, 0xBE, 0x7A, 0xE8, 0x56, > > > > - 0x19, 0x92, 0xAC, 0xBD, 0x78, 0xCC, 0x54, 0xDC, > > > > - 0x2D, 0xE6, 0x7D, 0x61, 0xE1, 0x27, 0xA7, 0x43, > > > > - 0x46, 0x25, 0x51, 0x95, 0x47, 0xF6, 0xB1, 0x68, > > > > - 0x17, 0xE6, 0x21, 0xD4, 0x83, 0x1E, 0x32, 0xAF, > > > > - 0x22, 0xA4, 0x7D, 0x3D, 0x1F, 0xE6, 0x43, 0x96, > > > > - 0x64, 0xAB, 0xC5, 0x81, 0xBC, 0x79, 0x14, 0x54, > > > > - 0x02, 0x78, 0x79, 0x71, 0x58, 0xC2, 0x2E, 0x56, > > > > - 0x21, 0x6B, 0x40, 0xDB, 0x79, 0xD1, 0x80, 0x5D, > > > > - 0x61, 0xF0, 0x9F, 0x4A, 0xC3, 0x8F, 0xAC, 0x98, > > > > - 0x94, 0x88, 0x2C, 0xA5, 0xCB, 0x06, 0x47, 0x73, > > > > - 0x27, 0x71, 0xA8, 0x0C, 0xBD, 0xFD, 0x83, 0xBF, > > > > - 0xA2, 0xCC, 0x91, 0x63, 0x9D, 0xC5, 0x58, 0x50, > > > > - 0x53, 0x98, 0xA0, 0x5F, 0x0B, 0xDE, 0x15, 0x65, > > > > - 0xFB, 0x5D, 0xF1, 0x9C, 0xD0, 0xC3, 0x6B, 0x4D, > > > > - 0x31, 0x20, 0x2F, 0x4D, 0x4F, 0x9D, 0xEB, 0xCB, > > > > - 0xFC, 0xDA, 0x54, 0xC1, 0x57, 0x10, 0x0F, 0xFC, > > > > - 0xD2, 0xA7, 0x44, 0x0E, 0x89, 0x0D, 0x89, 0x56, > > > > - 0x1E, 0x40, 0x64, 0xFF, 0x9E, 0xB1, 0x5C, 0x9A, > > > > - 0x6E, 0xE5, 0xE9, 0x48, 0xAB, 0x27, 0x91, 0x9A, > > > > - 0x3B, 0x8D, 0xB6, 0xA0, 0xD6, 0xD8, 0x9B, 0xBD, > > > > - 0x0D, 0x1D, 0x90, 0xED, 0x54, 0xE1, 0x75, 0x5B, > > > > - 0x89, 0xE1, 0x0C, 0xC7, 0x42, 0xD7, 0x68, 0xCB, > > > > - 0x41, 0x59, 0xC1, 0x96, 0xD9, 0x77, 0x88, 0xF1, > > > > - 0x68, 0x90, 0xDA, 0xE0, 0xB7, 0x1E, 0x2C, 0xDB, > > > > - 0x27, 0x78, 0xC0, 0x15, 0x68, 0x9E, 0xF7, 0x48, > > > > - 0x45, 0xFC, 0x22, 0x5D, 0x2B, 0xFA, 0xC7, 0x81, > > > > - 0x26, 0x60, 0xF7, 0x50, 0xEE, 0xF9, 0x61, 0xF8, > > > > - 0x59, 0x28, 0x92, 0xEE, 0xD7, 0x92, 0x5F, 0x5E, > > > > - 0xA5, 0x5A, 0x4C, 0xC7, 0x89, 0x9B, 0x9F, 0x8F, > > > > - 0x01, 0x3B, 0x9D, 0x8D, 0xF8, 0x6B, 0xEE, 0x64, > > > > - 0x54 > > > > - }, > > > > - .len =3D 321 > > > > - }, > > > > - .reminder =3D { > > > > - .data =3D { > > > > - 0x4A, 0x18, 0x9C, 0xCB, 0x90, 0x71, 0x8E, 0xD3, > > > > - 0xCA, 0xEB, 0xF1, 0xE7, 0xE8, 0xB0, 0x19, 0x9C, > > > > - 0x05, 0x51, 0x29, 0x8C, 0xB9, 0x6D, 0x1B, 0x05, > > > > - 0xDC, 0x16, 0x91, 0x0E, 0x69, 0xF3, 0x76, 0x29, > > > > - 0x9D, 0x91, 0x21, 0x98, 0x56, 0x9A, 0x22, 0x20, > > > > - 0xDF, 0x75, 0x4D, 0x40, 0x51, 0x99, 0x6E, 0xEA, > > > > - 0x37, 0x22, 0xF4, 0x27, 0x04, 0x6E, 0xDC, 0xB2, > > > > - 0xF5, 0xF6, 0xF8, 0xD6, 0xA8, 0xB7, 0x2D, 0xB7, > > > > - 0x18, 0x44, 0xF7, 0x62, 0x91, 0x44, 0x97, 0x91, > > > > - 0x6C, 0x14, 0x7E, 0xEB, 0x00, 0xB0, 0x3F, 0x7D, > > > > - 0x7B, 0x4A, 0xD0, 0x04, 0xD2, 0xCC, 0x5A, 0x22, > > > > - 0xB5, 0x0E, 0xAB, 0x1A, 0xB0, 0xD7, 0x97, 0xDD, > > > > - 0xE5, 0x78, 0xA9, 0x97, 0xF4, 0xC7, 0xE0, 0x28, > > > > - 0x00, 0xF3, 0x48, 0xCA, 0x69, 0xD0, 0xE8, 0x43, > > > > - 0x12, 0x82, 0x24, 0xBA, 0x28, 0xBD, 0x8E, 0xCB, > > > > - 0xB1, 0x98, 0x08, 0xC5, 0x0F, 0xF2, 0xE9, 0xA2, > > > > - 0x6C, 0xCC, 0xA9, 0x21, 0xA6, 0x38, 0xAE, 0x88, > > > > - 0x35, 0x5E, 0xBB, 0xEF, 0x37, 0xAB, 0xDA, 0x07, > > > > - 0x5F, 0x0A, 0xB4, 0x29, 0x65, 0x24, 0x22, 0x6C, > > > > - 0x9E, 0xF5, 0x19, 0xA4, 0x8E, 0x5A, 0xFA, 0xFC, > > > > - 0x97, 0x8A, 0xE8, 0x2B, 0x6D, 0x4B, 0xD0, 0xFB, > > > > - 0x86, 0xB9, 0xE7, 0x2C, 0x08, 0x25, 0x17, 0x90, > > > > - 0x77, 0x54, 0xE0, 0xBA, 0x0F, 0x59, 0x6C, 0x8C, > > > > - 0x0E, 0xCF, 0x54, 0x55, 0x6C, 0xF1, 0x65, 0x48, > > > > - 0xCC, 0xF4, 0xAB, 0xA1, 0x91, 0x07, 0x29, 0xFC, > > > > - 0x46, 0xBC, 0x2C, 0x85, 0xA1, 0x0C, 0x8A, 0x77, > > > > - 0x7A, 0xC6, 0x01, 0x34, 0xCE, 0x92, 0x1D, 0x88, > > > > - 0x54, 0x23, 0x26, 0x9B, 0x6B, 0x80, 0x6D, 0x08, > > > > - 0x99, 0xAE, 0xC0, 0xF6, 0x45, 0x97, 0xAF, 0xCD, > > > > - 0x2F, 0x4A, 0x7E, 0xAB, 0xD8, 0x31, 0x48, 0xA1, > > > > - 0xEB, 0x5E, 0xD1, 0xC0, 0xE7, 0xD5, 0x37, 0x3D, > > > > - 0x03, 0xA3, 0x16, 0x09, 0xD4, 0xDE, 0xC3, 0x97, > > > > - 0x13, 0xB6, 0x67, 0x55, 0x8A, 0x71, 0x51, 0x66, > > > > - 0xF5, 0xA1, 0x3B, 0xE3, 0x49, 0x8D, 0x7C, 0x52, > > > > - 0xCD, 0xA7, 0x11, 0xDD, 0xE0, 0xA0, 0x5C, 0xD8, > > > > - 0xF8, 0xDF, 0x01, 0xC5, 0x61, 0x87, 0xB4, 0xDE, > > > > - 0x3E, 0x39, 0xED, 0xC3, 0x3F, 0x84, 0x70, 0x37, > > > > - 0xBA, 0xDB, 0x5B > > > > - }, > > > > - .len =3D 299 > > > > - }, > > > > - .modulus =3D { > > > > - .data =3D { > > > > - 0x85, 0x04, 0x13, 0x7C, 0x4D, 0xBF, 0xC6, 0x25, > > > > - 0xD9, 0xAA, 0x1F, 0xED, 0x00, 0x69, 0xD7, 0x6C, > > > > - 0xB0, 0x46, 0x52, 0xA5, 0xF4, 0xF6, 0x55, 0x16, > > > > - 0x67, 0x52, 0x09, 0xF0, 0x28, 0xA7, 0x30, 0x22, > > > > - 0x34, 0xF1, 0xEA, 0xEB, 0x7C, 0x18, 0xEE, 0xAC, > > > > - 0x1A, 0xC1, 0xF5, 0x31, 0x7E, 0xA4, 0x4A, 0x0C, > > > > - 0xEA, 0xFE, 0x33, 0xDB, 0x49, 0x04, 0xFD, 0x33, > > > > - 0x3F, 0xB1, 0x41, 0x1F, 0xBD, 0x43, 0x71, 0xDE, > > > > - 0xB9, 0xA2, 0x4F, 0x20, 0x57, 0xAF, 0x27, 0x37, > > > > - 0x58, 0xA8, 0x51, 0x5D, 0x4E, 0xAB, 0x17, 0x1C, > > > > - 0x99, 0xD9, 0xB2, 0x0D, 0x21, 0xCA, 0x35, 0x52, > > > > - 0xF2, 0x4C, 0x7C, 0x79, 0x83, 0x2C, 0xF2, 0x87, > > > > - 0xC5, 0x58, 0x6E, 0x6E, 0x48, 0xFB, 0x32, 0x4D, > > > > - 0x1C, 0xDC, 0xE9, 0xDA, 0x9B, 0x77, 0x19, 0xD9, > > > > - 0x78, 0xE4, 0xF5, 0x3A, 0x49, 0x3D, 0x0D, 0x3D, > > > > - 0x10, 0x77, 0x0B, 0xC2, 0xE6, 0x66, 0x68, 0xFA, > > > > - 0x55, 0x99, 0x65, 0x5E, 0x55, 0x87, 0xCF, 0x3C, > > > > - 0x9C, 0x6C, 0x08, 0x09, 0x1F, 0x9C, 0xCB, 0x5E, > > > > - 0xE5, 0x19, 0x39, 0xA9, 0x2F, 0xF0, 0x49, 0x3D, > > > > - 0x7C, 0xB6, 0x7B, 0xA2, 0x93, 0xF1, 0x52, 0xD8, > > > > - 0x92, 0xDD, 0x56, 0x57, 0x8E, 0xE2, 0x5F, 0xA0, > > > > - 0x64, 0xB2, 0xC5, 0x0F, 0xB9, 0x89, 0xA6, 0x3F, > > > > - 0x54, 0x51, 0x2D, 0x01, 0x51, 0x78, 0x32, 0xE1, > > > > - 0xA7, 0x4D, 0x45, 0xC0, 0xD0, 0x6C, 0xE7, 0xCA, > > > > - 0xB2, 0x3F, 0x17, 0xD4, 0xB6, 0x58, 0x9B, 0xA8, > > > > - 0xBA, 0x2F, 0x3D, 0x1D, 0x6A, 0x73, 0x82, 0x2B, > > > > - 0x26, 0x2E, 0x7A, 0xEE, 0xEA, 0x41, 0x25, 0xFE, > > > > - 0xF0, 0xA2, 0x9C, 0x60, 0x35, 0xAD, 0x34, 0x30, > > > > - 0x55, 0x02, 0x6B, 0x06, 0xF4, 0xAD, 0x91, 0xA3, > > > > - 0xA2, 0x9C, 0x12, 0x8D, 0xDF, 0x2B, 0x3F, 0x0C, > > > > - 0x54, 0xCB, 0x98, 0xBA, 0xA1, 0x33, 0x70, 0xEF, > > > > - 0xF1, 0xEE, 0x15, 0xB7, 0xC6, 0x27, 0x47, 0x83, > > > > - 0x90, 0x58, 0x08, 0x16, 0x83, 0x94, 0xE9, 0x95, > > > > - 0x8B, 0x03, 0xD0, 0x3C, 0x45, 0xF8, 0x90, 0xC9, > > > > - 0xA7, 0x64, 0x76, 0xE8, 0x01, 0xA4, 0xA2, 0xAD, > > > > - 0x6F, 0x19, 0xCF, 0x38, 0x9A, 0xAB, 0x6E, 0xBE, > > > > - 0x79, 0xE4, 0x0F, 0xCE, 0x9C, 0x59, 0xF2, 0xF4, > > > > - 0x26, 0xAB, 0x0F > > > > - }, > > > > - .len =3D 299 > > > > - }, > > > > - .result_len =3D 299 > > > > -}, > > > > -{ > > > > - .description =3D "Modular Exponentiation " > > > > "(mod=3D448, base=3D50, exp=3D40, res=3D448)", > > > > .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > > .base =3D { > > > > @@ -811,106 +410,6 @@ modex_test_data modex_test_case[] =3D { > > > > }, > > > > .result_len =3D 448 > > > > }, > > > > -{ > > > > - .description =3D "Modular Exponentiation " > > > > - "(mod=3D19, base=3D500, exp=3D35, res=3D19)", > > > > - .xform_type =3D RTE_CRYPTO_ASYM_XFORM_MODEX, > > > > - .base =3D { > > > > - .data =3D { > > > > - 0x42, 0xE5, 0x6F, 0xF7, 0xEF, 0x8F, 0xAB, 0x6F, > > > > - 0xF5, 0xE2, 0xD2, 0x97, 0x68, 0x0D, 0x52, 0xDD, > > > > - 0x3D, 0x62, 0xC4, 0xC4, 0xDE, 0xD2, 0x07, 0x50, > > > > - 0x1B, 0xA9, 0x5F, 0xAE, 0x42, 0xCB, 0x5E, 0x0B, > > > > - 0xC0, 0x41, 0xFE, 0xEF, 0x22, 0xA6, 0x4E, 0x35, > > > > - 0x80, 0x61, 0x22, 0x92, 0x65, 0x77, 0x45, 0x84, > > > > - 0x6C, 0x03, 0x7C, 0xEF, 0xC0, 0x49, 0x31, 0x87, > > > > - 0x86, 0x9B, 0x2E, 0x28, 0xA1, 0x55, 0x2D, 0x3C, > > > > - 0x68, 0x3D, 0x69, 0x0E, 0x98, 0xD6, 0x40, 0xFD, > > > > - 0x0B, 0x4C, 0x5F, 0xC7, 0x95, 0xF1, 0x53, 0x7C, > > > > - 0xCC, 0x12, 0x3F, 0x8C, 0x7A, 0x24, 0x73, 0xE7, > > > > - 0x33, 0x20, 0xBD, 0x0C, 0xD2, 0x9C, 0x12, 0x20, > > > > - 0xC0, 0xC0, 0xA9, 0x16, 0x7E, 0x6B, 0x1D, 0x1F, > > > > - 0xFE, 0x63, 0x8A, 0x22, 0x75, 0xDC, 0xF0, 0x0F, > > > > - 0x8E, 0xA4, 0x3C, 0xE3, 0x6B, 0xFA, 0x46, 0xBA, > > > > - 0xEB, 0x91, 0x31, 0x9D, 0x34, 0xED, 0xA0, 0xA6, > > > > - 0xA3, 0xAB, 0xA5, 0x2A, 0x10, 0x30, 0xF4, 0x6F, > > > > - 0x80, 0x25, 0xB0, 0xF5, 0x56, 0x76, 0xD3, 0xC5, > > > > - 0x10, 0x92, 0xCD, 0xEA, 0xC3, 0x9C, 0x52, 0x96, > > > > - 0xF1, 0xBD, 0x42, 0x53, 0xF3, 0xA9, 0x1F, 0xCB, > > > > - 0x53, 0x45, 0xF1, 0xF6, 0x5F, 0x98, 0xFC, 0x13, > > > > - 0xC9, 0xA8, 0x44, 0xC6, 0xD0, 0x78, 0xB6, 0x39, > > > > - 0x93, 0x02, 0xC6, 0xC9, 0x0F, 0xAF, 0xF9, 0x6D, > > > > - 0x91, 0x35, 0xC9, 0x26, 0x73, 0x11, 0xEB, 0xEE, > > > > - 0x52, 0x61, 0x6C, 0xC0, 0x7F, 0xFD, 0xD0, 0x77, > > > > - 0x9F, 0xC6, 0x0A, 0x05, 0x1B, 0x90, 0x61, 0x54, > > > > - 0x61, 0xFF, 0x1E, 0xBA, 0x1D, 0x2F, 0x25, 0xE9, > > > > - 0x85, 0x4C, 0xBA, 0xEF, 0x99, 0x95, 0x3C, 0xBB, > > > > - 0xA9, 0xCF, 0x0D, 0xBF, 0x2C, 0x86, 0xB0, 0x59, > > > > - 0xAA, 0x83, 0x29, 0x32, 0x24, 0x28, 0xC8, 0x53, > > > > - 0x28, 0x4C, 0xEB, 0x08, 0xFF, 0xC6, 0x25, 0xB7, > > > > - 0xFF, 0x18, 0xB0, 0x2C, 0xDD, 0xAE, 0xFB, 0xDB, > > > > - 0x54, 0xA2, 0x92, 0x27, 0x15, 0x0D, 0x6B, 0x50, > > > > - 0xFB, 0xEA, 0x2C, 0x1C, 0x6F, 0x91, 0x3C, 0x50, > > > > - 0x5A, 0xD8, 0x9B, 0x33, 0xED, 0x51, 0x5D, 0x7C, > > > > - 0x37, 0x01, 0xEF, 0x09, 0xEA, 0x59, 0x56, 0x8A, > > > > - 0x67, 0x21, 0x8C, 0x25, 0x00, 0x33, 0x24, 0x31, > > > > - 0xCB, 0xAA, 0x5A, 0xA4, 0xB1, 0x84, 0xDD, 0x89, > > > > - 0x3A, 0xFA, 0xD8, 0xAB, 0xEE, 0x3E, 0xC0, 0x0D, > > > > - 0xDA, 0x2C, 0x2A, 0x75, 0x13, 0xD7, 0x49, 0x5E, > > > > - 0x28, 0x2C, 0x24, 0xC6, 0x1E, 0xA0, 0xB3, 0x70, > > > > - 0xAD, 0x45, 0x8A, 0xF2, 0xD9, 0x38, 0x69, 0xD5, > > > > - 0x53, 0x30, 0xD8, 0x09, 0x09, 0xDE, 0x1F, 0x6C, > > > > - 0x36, 0x82, 0xD5, 0xEC, 0xA7, 0x7E, 0x37, 0x5F, > > > > - 0x7D, 0xF2, 0x85, 0x85, 0xF9, 0x0A, 0xC1, 0x13, > > > > - 0x86, 0x3C, 0xCD, 0xFE, 0x44, 0x46, 0x57, 0x5E, > > > > - 0x67, 0x39, 0x9D, 0x65, 0x74, 0xB9, 0x13, 0x5A, > > > > - 0x05, 0xC1, 0xEA, 0xB5, 0x10, 0x1D, 0x66, 0xFF, > > > > - 0xA0, 0x3D, 0x47, 0x27, 0x15, 0x66, 0x52, 0x19, > > > > - 0xFA, 0x95, 0xD0, 0x03, 0x67, 0xA8, 0x89, 0xAA, > > > > - 0x68, 0x04, 0x5F, 0xC4, 0x57, 0x1F, 0x6C, 0xF7, > > > > - 0xD2, 0xE2, 0xA3, 0xF3, 0x96, 0x70, 0x86, 0xC6, > > > > - 0xCB, 0x3D, 0x52, 0x66, 0x79, 0xED, 0xE6, 0x35, > > > > - 0x0A, 0xE8, 0xA8, 0x5A, 0xED, 0x41, 0xB0, 0xF0, > > > > - 0x89, 0xCC, 0x20, 0xDA, 0xB7, 0x48, 0x44, 0x64, > > > > - 0x69, 0xC9, 0x43, 0xE2, 0xBD, 0xD1, 0x17, 0xCF, > > > > - 0x25, 0x7C, 0x92, 0x0B, 0xFC, 0x71, 0x46, 0x67, > > > > - 0x1F, 0xF4, 0xA7, 0xFF, 0xD8, 0xA4, 0x5F, 0x4A, > > > > - 0x8A, 0x45, 0xBE, 0xDD, 0x89, 0xE2, 0x2A, 0xA7, > > > > - 0xBC, 0xE9, 0x84, 0x53, 0x9D, 0xF4, 0x39, 0xB7, > > > > - 0xDB, 0x3A, 0x17, 0xF7, 0x27, 0x39, 0xDF, 0x8A, > > > > - 0xF0, 0x72, 0xD6, 0x23, 0x1B, 0x1C, 0xD9, 0x48, > > > > - 0xF4, 0x2E, 0x54, 0xA3 > > > > - }, > > > > - .len =3D 500 > > > > - }, > > > > - .exponent =3D { > > > > - .data =3D { > > > > - 0xE7, 0xF1, 0x97, 0x29, 0x62, 0x0B, 0x99, 0x89, > > > > - 0x99, 0xC1, 0x63, 0xA2, 0xB7, 0x29, 0xAD, 0x0E, > > > > - 0x84, 0x3B, 0x86, 0x82, 0xC4, 0xDD, 0xC4, 0xE2, > > > > - 0xA7, 0xD4, 0xBA, 0x91, 0x2C, 0xB5, 0xD6, 0xD4, > > > > - 0x74, 0x1D, 0xE1 > > > > - }, > > > > - .len =3D 35 > > > > - }, > > > > - .reminder =3D { > > > > - .data =3D { > > > > - 0x67, 0x9F, 0xF7, 0x57, 0xD7, 0xF8, 0xF8, 0x90, > > > > - 0x4E, 0xB5, 0x34, 0xE8, 0xAF, 0x14, 0xC6, 0x94, > > > > - 0x5F, 0xA1, 0x03 > > > > - }, > > > > - .len =3D 19 > > > > - }, > > > > - .modulus =3D { > > > > - .data =3D { > > > > - 0x9C, 0xE7, 0xE7, 0x14, 0x6E, 0x07, 0x71, 0xD2, > > > > - 0xD1, 0xB3, 0x59, 0x9B, 0x63, 0xDB, 0x58, 0x8D, > > > > - 0x5E, 0x84, 0xA0 > > > > - }, > > > > - .len =3D 19 > > > > - }, > > > > - .result_len =3D 19 > > > > -} > > > > }; > > > > > > > > static const struct > > > > -- > > > > 2.13.6