Adapted .function files and .data files to new test framework

Changes include:
 - Integers marked with '#' in the .function files.
 - Strings should have "" in .data files.
 - String comparison instead of preprocessor-like replace for e.g. '=='
 - Params and variables cannot have the same name in .function files
diff --git a/tests/suites/test_suite_rsa.function b/tests/suites/test_suite_rsa.function
index 848ef76..30eff8f 100644
--- a/tests/suites/test_suite_rsa.function
+++ b/tests/suites/test_suite_rsa.function
@@ -15,7 +15,7 @@
 END_DEPENDENCIES
 
 BEGIN_CASE
-rsa_pkcs1_sign:message_hex_string:padding_mode:digest:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_E:input_E:result_hex_str:result
+rsa_pkcs1_sign:message_hex_string:#padding_mode:#digest:#mod:#radix_P:input_P:#radix_Q:input_Q:#radix_N:input_N:#radix_E:input_E:result_hex_str:#result
 {
     unsigned char message_str[1000];
     unsigned char hash_result[1000];
@@ -69,7 +69,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_pkcs1_verify:message_hex_string:padding_mode:digest:mod:radix_N:input_N:radix_E:input_E:result_hex_str:result
+rsa_pkcs1_verify:message_hex_string:#padding_mode:#digest:#mod:#radix_N:input_N:#radix_E:input_E:result_hex_str:#result
 {
     unsigned char message_str[1000];
     unsigned char hash_result[1000];
@@ -102,7 +102,7 @@
 
 
 BEGIN_CASE
-rsa_pkcs1_sign_raw:message_hex_string:hash_result_string:padding_mode:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_E:input_E:result_hex_str
+rsa_pkcs1_sign_raw:message_hex_string:hash_result_string:#padding_mode:#mod:#radix_P:input_P:#radix_Q:input_Q:#radix_N:input_N:#radix_E:input_E:result_hex_str
 {
     unsigned char message_str[1000];
     unsigned char hash_result[1000];
@@ -152,7 +152,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_pkcs1_verify_raw:message_hex_string:hash_result_string:padding_mode:mod:radix_N:input_N:radix_E:input_E:result_hex_str:correct
+rsa_pkcs1_verify_raw:message_hex_string:hash_result_string:#padding_mode:#mod:#radix_N:input_N:#radix_E:input_E:result_hex_str:#correct
 {
     unsigned char message_str[1000];
     unsigned char hash_result[1000];
@@ -182,7 +182,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_pkcs1_encrypt:message_hex_string:padding_mode:mod:radix_N:input_N:radix_E:input_E:result_hex_str:result
+rsa_pkcs1_encrypt:message_hex_string:#padding_mode:#mod:#radix_N:input_N:#radix_E:input_E:result_hex_str:#result
 {
     unsigned char message_str[1000];
     unsigned char output[1000];
@@ -219,7 +219,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_pkcs1_encrypt_bad_rng:message_hex_string:padding_mode:mod:radix_N:input_N:radix_E:input_E:result_hex_str:result
+rsa_pkcs1_encrypt_bad_rng:message_hex_string:#padding_mode:#mod:#radix_N:input_N:#radix_E:input_E:result_hex_str:#result
 {
     unsigned char message_str[1000];
     unsigned char output[1000];
@@ -253,7 +253,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_pkcs1_decrypt:message_hex_string:padding_mode:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_E:input_E:max_output:result_hex_str:result
+rsa_pkcs1_decrypt:message_hex_string:#padding_mode:#mod:#radix_P:input_P:#radix_Q:input_Q:#radix_N:input_N:#radix_E:input_E:#max_output:result_hex_str:#result
 {
     unsigned char message_str[1000];
     unsigned char output[1000];
@@ -303,7 +303,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_public:message_hex_string:mod:radix_N:input_N:radix_E:input_E:result_hex_str:result
+rsa_public:message_hex_string:#mod:#radix_N:input_N:#radix_E:input_E:result_hex_str:#result
 {
     unsigned char message_str[1000];
     unsigned char output[1000];
@@ -336,7 +336,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_private:message_hex_string:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_E:input_E:result_hex_str:result
+rsa_private:message_hex_string:#mod:#radix_P:input_P:#radix_Q:input_Q:#radix_N:input_N:#radix_E:input_E:result_hex_str:#result
 {
     unsigned char message_str[1000];
     unsigned char output[1000];
@@ -394,7 +394,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_check_pubkey:radix_N:input_N:radix_E:input_E:result
+rsa_check_pubkey:#radix_N:input_N:#radix_E:input_E:#result
 {
     rsa_context ctx;
 
@@ -416,7 +416,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_check_privkey:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_E:input_E:radix_D:input_D:radix_DP:input_DP:radix_DQ:input_DQ:radix_QP:input_QP:result
+rsa_check_privkey:#mod:#radix_P:input_P:#radix_Q:input_Q:#radix_N:input_N:#radix_E:input_E:#radix_D:input_D:#radix_DP:input_DP:#radix_DQ:input_DQ:#radix_QP:input_QP:#result
 {
     rsa_context ctx;
 
@@ -463,7 +463,7 @@
 END_CASE
 
 BEGIN_CASE
-rsa_gen_key:nrbits:exponent:result
+rsa_gen_key:#nrbits:#exponent:#result
 {
     rsa_context ctx;
     entropy_context entropy;