Remove radix arg from bignum tests

Cases where radix was explictly declared are removed in most cases,
replaced using script. bignum arguments are represented as hexadecimal
strings. This reduces clutter in test data and makes bit patterns
clearer.

Signed-off-by: Werner Lewis <werner.lewis@arm.com>
diff --git a/tests/suites/test_suite_pk.function b/tests/suites/test_suite_pk.function
index 6f7bee9..2596a03 100644
--- a/tests/suites/test_suite_pk.function
+++ b/tests/suites/test_suite_pk.function
@@ -478,7 +478,7 @@
 
 /* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
 void pk_rsa_verify_test_vec( data_t * message_str, int digest, int mod,
-                             int radix_N, char * input_N, int radix_E,
+                             char * input_N,
                              char * input_E, data_t * result_str,
                              int result )
 {
@@ -523,8 +523,8 @@
 
 /* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
 void pk_rsa_verify_ext_test_vec( data_t * message_str, int digest,
-                                 int mod, int radix_N, char * input_N,
-                                 int radix_E, char * input_E,
+                                 int mod, char * input_N,
+                                 char * input_E,
                                  data_t * result_str, int pk_type,
                                  int mgf1_hash_id, int salt_len, int sig_len,
                                  int result )
@@ -795,9 +795,9 @@
 /* END_CASE */
 
 /* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
-void pk_rsa_encrypt_decrypt_test( data_t * message, int mod, int radix_P,
-                                  char * input_P, int radix_Q, char * input_Q,
-                                  int radix_N, char * input_N, int radix_E,
+void pk_rsa_encrypt_decrypt_test( data_t * message, int mod,
+                                  char * input_P, char * input_Q,
+                                  char * input_N,
                                   char * input_E, int ret )
 {
     unsigned char output[300], result[300];
@@ -872,9 +872,9 @@
 /* END_CASE */
 
 /* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
-void pk_rsa_decrypt_test_vec( data_t * cipher, int mod, int radix_P,
-                              char * input_P, int radix_Q, char * input_Q,
-                              int radix_N, char * input_N, int radix_E,
+void pk_rsa_decrypt_test_vec( data_t * cipher, int mod,
+                              char * input_P, char * input_Q,
+                              char * input_N,
                               char * input_E, data_t * clear, int ret )
 {
     unsigned char output[256];
@@ -929,9 +929,9 @@
 /* END_CASE */
 
 /* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_USE_PSA_CRYPTO */
-void pk_wrap_rsa_decrypt_test_vec( data_t * cipher, int mod, int radix_P,
-                                   char * input_P, int radix_Q, char * input_Q,
-                                   int radix_N, char * input_N, int radix_E,
+void pk_wrap_rsa_decrypt_test_vec( data_t * cipher, int mod,
+                                   char * input_P, char * input_Q,
+                                   char * input_N,
                                    char * input_E, data_t * clear, int ret )
 {
     unsigned char output[256];