xref: /dpdk/app/test/test_cryptodev_rsa_test_vectors.h (revision 68a03efeed657e6e05f281479b33b51102797e15)
1 /* SPDX-License-Identifier: BSD-3-Clause
2  * Copyright(c) 2018 Cavium Networks
3  */
4 
5 #ifndef TEST_CRYPTODEV_RSA_TEST_VECTORS_H__
6 #define TEST_CRYPTODEV_RSA_TEST_VECTORS_H__
7 
8 #include <stdint.h>
9 
10 #include "rte_crypto_asym.h"
11 
12 #define TEST_DATA_SIZE 4096
13 
14 struct rsa_test_data_2 {
15 	enum rte_crypto_asym_xform_type xform_type;
16 	const char *description;
17 	uint64_t op_type_flags;
18 	struct {
19 		uint8_t data[DATA_SIZE];
20 		uint16_t len;
21 	} pt;
22 	struct {
23 		uint8_t data[DATA_SIZE];
24 		uint16_t len;
25 	} ct;
26 	struct {
27 		uint8_t data[DATA_SIZE];
28 		uint16_t len;
29 	} sign;
30 	struct {
31 		uint8_t data[DATA_SIZE];
32 		uint16_t len;
33 	} e;
34 	struct {
35 		uint8_t data[DATA_SIZE];
36 		uint16_t len;
37 	} d;
38 	struct {
39 		uint8_t data[DATA_SIZE];
40 		uint16_t len;
41 	} n;
42 	struct {
43 		uint8_t data[DATA_SIZE];
44 		uint16_t len;
45 	} p;
46 	struct {
47 		uint8_t data[DATA_SIZE];
48 		uint16_t len;
49 	} q;
50 	struct {
51 		uint8_t data[DATA_SIZE];
52 		uint16_t len;
53 	} dP;
54 	struct {
55 		uint8_t data[DATA_SIZE];
56 		uint16_t len;
57 	} dQ;
58 	struct {
59 		uint8_t data[DATA_SIZE];
60 		uint16_t len;
61 	} qInv;
62 
63 	uint16_t result_len;
64 	enum rte_crypto_rsa_padding_type padding;
65 	int key_exp;
66 	int key_qt;
67 };
68 
69 static const struct
70 rsa_test_data_2 rsa_test_case_list[] = {
71 	{
72 		.description = "RSA Encryption Decryption "
73 					   "(n=128, pt=20, e=3) EXP, QT",
74 		.xform_type = RTE_CRYPTO_ASYM_XFORM_RSA,
75 		.op_type_flags = 1UL << RTE_CRYPTO_ASYM_OP_ENCRYPT |
76 					1UL << RTE_CRYPTO_ASYM_OP_DECRYPT,
77 		.pt = {
78 			.data = {
79 				0x00, 0x02, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
80 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
81 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
82 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
83 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
84 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
85 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
86 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
87 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
88 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
89 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
90 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
91 				0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xbb,
92 				0xbb, 0xbb, 0xbb, 0xbb, 0xf8, 0xba, 0x1a, 0x55,
93 				0xd0, 0x2f, 0x85, 0xae,	0x96, 0x7b, 0xb6, 0x2f,
94 				0xb6, 0xcd, 0xa8, 0xeb,	0x7e, 0x78, 0xa0, 0x50
95 			},
96 			.len = 128,
97 		},
98 		.ct = {
99 			.data = {
100 				0x3D, 0x8D, 0x2F, 0x85, 0xC0, 0xB7, 0x21, 0x3E,
101 				0x5B, 0x4A, 0x96, 0xB2, 0x85, 0x35, 0xAF, 0x0C,
102 				0x62, 0xE9, 0x73, 0xEF, 0x77, 0x76, 0x19, 0xD5,
103 				0x92, 0xF7, 0x1D, 0xB0, 0x15, 0x69, 0x65, 0x82,
104 				0x32, 0x30, 0x4E, 0x29, 0xE7, 0x83, 0xAD, 0x23,
105 				0x66, 0xD9, 0x91, 0x9B, 0xFF, 0x01, 0x10, 0x3B,
106 				0xB2, 0xF8, 0x78, 0x14, 0xD2, 0x6E, 0x3C, 0x59,
107 				0x6E, 0x1A, 0x90, 0x3C, 0x5A, 0xB3, 0x0B, 0x60,
108 				0xE2, 0x71, 0xCC, 0xF5, 0x0C, 0x57, 0x19, 0x03,
109 				0x5B, 0x04, 0x46, 0x7E, 0x13, 0x5B, 0xFF, 0x2C,
110 				0x01, 0x19, 0x75, 0x86, 0x6A, 0xAE, 0x60, 0xFB,
111 				0x0A, 0x4C, 0x14, 0x1A, 0xBC, 0x0E, 0x86, 0xF1,
112 				0x13, 0x10, 0xB3, 0x03, 0x8E, 0x66, 0x6F, 0xA5,
113 				0x53, 0x80, 0x5A, 0x91, 0xE6, 0x7C, 0x3C, 0x38,
114 				0x15, 0xB6, 0x69, 0x3E, 0xF6, 0x54, 0xB0, 0x60,
115 				0x83, 0xE9, 0x2B, 0xF3, 0x26, 0x53, 0x3E, 0x11
116 			},
117 			.len = 128,
118 		},
119 		.e = {
120 			.data = {
121 				0x01, 0x00, 0x01
122 			},
123 			.len = 3,
124 		},
125 		.d = {
126 			.data = {
127 				0x24, 0xd7, 0xea, 0xf4, 0x7f, 0xe0, 0xca, 0x31,
128 				0x4d, 0xee, 0xc4, 0xa1, 0xbe, 0xab, 0x06, 0x61,
129 				0x32, 0xe7, 0x51, 0x46, 0x27, 0xdf, 0x72, 0xe9,
130 				0x6f, 0xa8, 0x4c, 0xd1, 0x26, 0xef, 0x65, 0xeb,
131 				0x67, 0xff, 0x5f, 0xa7, 0x3b, 0x25, 0xb9, 0x08,
132 				0x8e, 0xa0, 0x47, 0x56, 0xe6, 0x8e, 0xf9, 0xd3,
133 				0x18, 0x06, 0x3d, 0xc6, 0xb1, 0xf8, 0xdc, 0x1b,
134 				0x8d, 0xe5, 0x30, 0x54, 0x26, 0xac, 0x16, 0x3b,
135 				0x7b, 0xad, 0x46, 0x9e, 0x21, 0x6a, 0x57, 0xe6,
136 				0x81, 0x56, 0x1d, 0x2a, 0xc4, 0x39, 0x63, 0x67,
137 				0x81, 0x2c, 0xca, 0xcc, 0xf8, 0x42, 0x04, 0xbe,
138 				0xcf, 0x8f, 0x6c, 0x5b, 0x81, 0x46, 0xb9, 0xc7,
139 				0x62, 0x90, 0x87, 0x35, 0x03, 0x9b, 0x89, 0xcb,
140 				0x37, 0xbd, 0xf1, 0x1b, 0x99, 0xa1, 0x9a, 0x78,
141 				0xd5, 0x4c, 0xdd, 0x3f, 0x41, 0x0c, 0xb7, 0x1a,
142 				0xd9, 0x7b, 0x87, 0x5f, 0xbe, 0xb1, 0x83, 0x41
143 			},
144 			.len = 128,
145 		},
146 		.n = {
147 			.data = {
148 				0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00, 0x0a,
149 				0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5, 0xce,
150 				0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a, 0xa2,
151 				0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde, 0x0a,
152 				0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a, 0x3d,
153 				0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63, 0x6a,
154 				0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27, 0x6e,
155 				0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa, 0x72,
156 				0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53, 0x87,
157 				0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a, 0x62,
158 				0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63, 0x18,
159 				0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33, 0x4e,
160 				0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3, 0x03,
161 				0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e, 0xee,
162 				0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb, 0xa6,
163 				0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde, 0x55
164 			},
165 			.len = 128,
166 		},
167 		.p = {
168 			.data = {
169 				0xdc, 0xba, 0x00, 0x01, 0x57, 0x93, 0xe3, 0x05,
170 				0xed, 0x61, 0x9a, 0xa3, 0xaf, 0x6a, 0xd3, 0x47,
171 				0x8f, 0x2d, 0x1e, 0x7f, 0x4d, 0x60, 0xc8, 0x8d,
172 				0x34, 0xb8, 0x17, 0x84, 0xbc, 0xd4, 0xe9, 0x79,
173 				0x95, 0x75, 0x19, 0x37, 0xe0, 0xcc, 0xfe, 0x4c,
174 				0x5d, 0x49, 0x53, 0x61, 0x29, 0xf1, 0xdc, 0x82,
175 				0x03, 0x96, 0x7d, 0x95, 0x4f, 0xdd, 0x3c, 0x0a,
176 				0x64, 0x8a, 0x43, 0x2f, 0x95, 0x4a, 0xed, 0xdd
177 			},
178 			.len = 64,
179 		},
180 		.q = {
181 			.data = {
182 				0xd0, 0x56, 0x7a, 0x0a, 0xd5, 0x95, 0xa4, 0x85,
183 				0x53, 0x35, 0xa1, 0x48, 0x07, 0x6a, 0x7c, 0x08,
184 				0xe0, 0xfd, 0x4b, 0x88, 0x77, 0xa6, 0x15, 0x23,
185 				0x0f, 0xbf, 0x14, 0x46, 0x11, 0xee, 0x95, 0xc7,
186 				0x5e, 0x77, 0x65, 0xa2, 0xb5, 0x50, 0xdf, 0x19,
187 				0x07, 0xc7, 0x72, 0xdb, 0x29, 0xf6, 0x54, 0x86,
188 				0xe1, 0xb3, 0x97, 0x0a, 0x28, 0x64, 0x3a, 0x38,
189 				0xa6, 0x7d, 0x13, 0xc3, 0x79, 0xaa, 0x56, 0xd9
190 			},
191 			.len = 64,
192 		},
193 		.dP = {
194 			.data = {
195 				0xc5, 0x43, 0x0d, 0x82, 0x25, 0x8c, 0xab, 0x55,
196 				0xbe, 0xc2, 0x7d, 0xfb, 0x4f, 0x68, 0x3f, 0x0e,
197 				0x32, 0xec, 0xf5, 0xd6, 0x7b, 0x86, 0xc5, 0x75,
198 				0x3c, 0xea, 0x51, 0x4a, 0x75, 0xa0, 0x2a, 0x50,
199 				0x58, 0xbb, 0xe0, 0x1f, 0xca, 0x2e, 0x2a, 0x0e,
200 				0x81, 0x48, 0x68, 0xd5, 0xeb, 0x30, 0x96, 0x0b,
201 				0x33, 0xbd, 0xa8, 0xda, 0x6a, 0x17, 0xa3, 0xf2,
202 				0xfd, 0xcb, 0x7b, 0x23, 0xe9, 0x5e, 0x9f, 0x99
203 			},
204 			.len = 64,
205 		},
206 		.dQ = {
207 			.data = {
208 				0xbe, 0xff, 0xf9, 0x05, 0x43, 0xc8, 0xdc, 0x3b,
209 				0x0b, 0x0d, 0x28, 0xde, 0x73, 0x46, 0x11, 0x8e,
210 				0xc6, 0x4e, 0x11, 0xd8, 0x7b, 0xf0, 0xfc, 0x81,
211 				0xd7, 0x66, 0xd3, 0xbc, 0x65, 0xa6, 0x39, 0x14,
212 				0xbd, 0xab, 0x72, 0xb7, 0x57, 0xc9, 0x5b, 0xaf,
213 				0x83, 0xed, 0x3b, 0x84, 0x68, 0x15, 0x18, 0x6b,
214 				0x4c, 0x32, 0xac, 0x6f, 0x38, 0x96, 0xa2, 0xb5,
215 				0xdb, 0x14, 0xe2, 0x70, 0x9c, 0x73, 0x29, 0x09
216 			},
217 			.len = 64,
218 		},
219 		.qInv = {
220 			.data = {
221 				0x59, 0xbd, 0xb1, 0x37, 0xeb, 0x4e, 0xcf, 0x68,
222 				0xe7, 0x85, 0x91, 0xbb, 0xc0, 0xdb, 0x8e, 0x41,
223 				0x91, 0x4a, 0xc0, 0xb1, 0xc5, 0xe8, 0x91, 0xf6,
224 				0xc7, 0x5a, 0x98, 0x1a, 0x8a, 0x0f, 0x45, 0xb2,
225 				0x5b, 0xff, 0x7a, 0x2d, 0x98, 0x89, 0x55, 0xd9,
226 				0xbf, 0x6e, 0xdd, 0x2d, 0xd4, 0xe8, 0x0a, 0xaa,
227 				0xae, 0x2a, 0xc4, 0x16, 0xb5, 0xba, 0xe1, 0x69,
228 				0x71, 0x94, 0xdd, 0xa0, 0xf5, 0x1e, 0x6d, 0xcc
229 			},
230 			.len = 64,
231 		},
232 		.padding = RTE_CRYPTO_RSA_PADDING_NONE,
233 		.key_exp = 1,
234 		.key_qt = 1,
235 	}
236 };
237 
238 struct rsa_test_data {
239 	uint8_t data[TEST_DATA_SIZE];
240 	unsigned int len;
241 };
242 
243 struct rsa_test_data rsaplaintext = {
244 	.data = {
245 		0xf8, 0xba, 0x1a, 0x55, 0xd0, 0x2f, 0x85, 0xae,
246 		0x96, 0x7b, 0xb6, 0x2f, 0xb6, 0xcd, 0xa8, 0xeb,
247 		0x7e, 0x78, 0xa0, 0x50
248 	},
249 	.len = 20
250 };
251 
252 uint8_t rsa_n[] = {
253 	0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00,
254 	0x0a, 0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5,
255 	0xce, 0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a,
256 	0xa2, 0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde,
257 	0x0a, 0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a,
258 	0x3d, 0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63,
259 	0x6a, 0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27,
260 	0x6e, 0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa,
261 	0x72, 0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53,
262 	0x87, 0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a,
263 	0x62, 0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63,
264 	0x18, 0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33,
265 	0x4e, 0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3,
266 	0x03, 0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e,
267 	0xee, 0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb,
268 	0xa6, 0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde,
269 	0x55
270 };
271 
272 uint8_t rsa_d[] = {
273 	0x24, 0xd7, 0xea, 0xf4, 0x7f, 0xe0, 0xca, 0x31,
274 	0x4d, 0xee, 0xc4, 0xa1, 0xbe, 0xab, 0x06, 0x61,
275 	0x32, 0xe7, 0x51, 0x46, 0x27, 0xdf, 0x72, 0xe9,
276 	0x6f, 0xa8, 0x4c, 0xd1, 0x26, 0xef, 0x65, 0xeb,
277 	0x67, 0xff, 0x5f, 0xa7, 0x3b, 0x25, 0xb9, 0x08,
278 	0x8e, 0xa0, 0x47, 0x56, 0xe6, 0x8e, 0xf9, 0xd3,
279 	0x18, 0x06, 0x3d, 0xc6, 0xb1, 0xf8, 0xdc, 0x1b,
280 	0x8d, 0xe5, 0x30, 0x54, 0x26, 0xac, 0x16, 0x3b,
281 	0x7b, 0xad, 0x46, 0x9e, 0x21, 0x6a, 0x57, 0xe6,
282 	0x81, 0x56, 0x1d, 0x2a, 0xc4, 0x39, 0x63, 0x67,
283 	0x81, 0x2c, 0xca, 0xcc, 0xf8, 0x42, 0x04, 0xbe,
284 	0xcf, 0x8f, 0x6c, 0x5b, 0x81, 0x46, 0xb9, 0xc7,
285 	0x62, 0x90, 0x87, 0x35, 0x03, 0x9b, 0x89, 0xcb,
286 	0x37, 0xbd, 0xf1, 0x1b, 0x99, 0xa1, 0x9a, 0x78,
287 	0xd5, 0x4c, 0xdd, 0x3f, 0x41, 0x0c, 0xb7, 0x1a,
288 	0xd9, 0x7b, 0x87, 0x5f, 0xbe, 0xb1, 0x83, 0x41
289 };
290 
291 uint8_t rsa_e[] = {0x01, 0x00, 0x01};
292 
293 uint8_t rsa_p[] = {
294 	0xdc, 0xba, 0x00, 0x01, 0x57, 0x93, 0xe3, 0x05,
295 	0xed, 0x61, 0x9a, 0xa3, 0xaf, 0x6a, 0xd3, 0x47,
296 	0x8f, 0x2d, 0x1e, 0x7f, 0x4d, 0x60, 0xc8, 0x8d,
297 	0x34, 0xb8, 0x17, 0x84, 0xbc, 0xd4, 0xe9, 0x79,
298 	0x95, 0x75, 0x19, 0x37, 0xe0, 0xcc, 0xfe, 0x4c,
299 	0x5d, 0x49, 0x53, 0x61, 0x29, 0xf1, 0xdc, 0x82,
300 	0x03, 0x96, 0x7d, 0x95, 0x4f, 0xdd, 0x3c, 0x0a,
301 	0x64, 0x8a, 0x43, 0x2f, 0x95, 0x4a, 0xed, 0xdd
302 };
303 
304 uint8_t rsa_q[] = {
305 	0xd0, 0x56, 0x7a, 0x0a, 0xd5, 0x95, 0xa4, 0x85,
306 	0x53, 0x35, 0xa1, 0x48, 0x07, 0x6a, 0x7c, 0x08,
307 	0xe0, 0xfd, 0x4b, 0x88, 0x77, 0xa6, 0x15, 0x23,
308 	0x0f, 0xbf, 0x14, 0x46, 0x11, 0xee, 0x95, 0xc7,
309 	0x5e, 0x77, 0x65, 0xa2, 0xb5, 0x50, 0xdf, 0x19,
310 	0x07, 0xc7, 0x72, 0xdb, 0x29, 0xf6, 0x54, 0x86,
311 	0xe1, 0xb3, 0x97, 0x0a, 0x28, 0x64, 0x3a, 0x38,
312 	0xa6, 0x7d, 0x13, 0xc3, 0x79, 0xaa, 0x56, 0xd9
313 };
314 
315 uint8_t rsa_dP[] = {
316 	0xc5, 0x43, 0x0d, 0x82, 0x25, 0x8c, 0xab, 0x55,
317 	0xbe, 0xc2, 0x7d, 0xfb, 0x4f, 0x68, 0x3f, 0x0e,
318 	0x32, 0xec, 0xf5, 0xd6, 0x7b, 0x86, 0xc5, 0x75,
319 	0x3c, 0xea, 0x51, 0x4a, 0x75, 0xa0, 0x2a, 0x50,
320 	0x58, 0xbb, 0xe0, 0x1f, 0xca, 0x2e, 0x2a, 0x0e,
321 	0x81, 0x48, 0x68, 0xd5, 0xeb, 0x30, 0x96, 0x0b,
322 	0x33, 0xbd, 0xa8, 0xda, 0x6a, 0x17, 0xa3, 0xf2,
323 	0xfd, 0xcb, 0x7b, 0x23, 0xe9, 0x5e, 0x9f, 0x99
324 };
325 uint8_t rsa_dQ[] = {
326 	0xbe, 0xff, 0xf9, 0x05, 0x43, 0xc8, 0xdc, 0x3b,
327 	0x0b, 0x0d, 0x28, 0xde, 0x73, 0x46, 0x11, 0x8e,
328 	0xc6, 0x4e, 0x11, 0xd8, 0x7b, 0xf0, 0xfc, 0x81,
329 	0xd7, 0x66, 0xd3, 0xbc, 0x65, 0xa6, 0x39, 0x14,
330 	0xbd, 0xab, 0x72, 0xb7, 0x57, 0xc9, 0x5b, 0xaf,
331 	0x83, 0xed, 0x3b, 0x84, 0x68, 0x15, 0x18, 0x6b,
332 	0x4c, 0x32, 0xac, 0x6f, 0x38, 0x96, 0xa2, 0xb5,
333 	0xdb, 0x14, 0xe2, 0x70, 0x9c, 0x73, 0x29, 0x09
334 };
335 
336 uint8_t rsa_qInv[] = {
337 	0x59, 0xbd, 0xb1, 0x37, 0xeb, 0x4e, 0xcf, 0x68,
338 	0xe7, 0x85, 0x91, 0xbb, 0xc0, 0xdb, 0x8e, 0x41,
339 	0x91, 0x4a, 0xc0, 0xb1, 0xc5, 0xe8, 0x91, 0xf6,
340 	0xc7, 0x5a, 0x98, 0x1a, 0x8a, 0x0f, 0x45, 0xb2,
341 	0x5b, 0xff, 0x7a, 0x2d, 0x98, 0x89, 0x55, 0xd9,
342 	0xbf, 0x6e, 0xdd, 0x2d, 0xd4, 0xe8, 0x0a, 0xaa,
343 	0xae, 0x2a, 0xc4, 0x16, 0xb5, 0xba, 0xe1, 0x69,
344 	0x71, 0x94, 0xdd, 0xa0, 0xf5, 0x1e, 0x6d, 0xcc
345 };
346 
347 /** rsa xform using exponent key */
348 struct rte_crypto_asym_xform rsa_xform = {
349 	.next = NULL,
350 	.xform_type = RTE_CRYPTO_ASYM_XFORM_RSA,
351 	.rsa = {
352 		.n = {
353 			.data = rsa_n,
354 			.length = sizeof(rsa_n)
355 		},
356 		.e = {
357 			.data = rsa_e,
358 			.length = sizeof(rsa_e)
359 		},
360 		.key_type = RTE_RSA_KEY_TYPE_EXP,
361 		.d = {
362 			.data = rsa_d,
363 			.length = sizeof(rsa_d)
364 		}
365 	}
366 };
367 
368 /** rsa xform using quintuple key */
369 struct rte_crypto_asym_xform rsa_xform_crt = {
370 	.next = NULL,
371 	.xform_type = RTE_CRYPTO_ASYM_XFORM_RSA,
372 	.rsa = {
373 		.n = {
374 			.data = rsa_n,
375 			.length = sizeof(rsa_n)
376 		},
377 		.e = {
378 			.data = rsa_e,
379 			.length = sizeof(rsa_e)
380 		},
381 		.key_type = RTE_RSA_KET_TYPE_QT,
382 		.qt = {
383 			.p = {
384 				.data = rsa_p,
385 				.length = sizeof(rsa_p)
386 			},
387 			.q = {
388 				.data = rsa_q,
389 				.length = sizeof(rsa_q)
390 			},
391 			.dP = {
392 				.data = rsa_dP,
393 				.length = sizeof(rsa_dP)
394 			},
395 			.dQ = {
396 				.data = rsa_dQ,
397 				.length = sizeof(rsa_dQ)
398 			},
399 			.qInv = {
400 				.data = rsa_qInv,
401 				.length = sizeof(rsa_qInv)
402 			},
403 		}
404 	}
405 };
406 
407 #endif /* TEST_CRYPTODEV_RSA_TEST_VECTORS_H__ */
408