Lines Matching +full:0 +full:x30
23 0x30, 0x20, 0x30, 0x0c, 0x06, 0x08,
24 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x05, /* OID */
25 0x05, 0x00, 0x04, 0x10
29 0x30, 0x21, 0x30, 0x09, 0x06, 0x05,
30 0x2b, 0x0e, 0x03, 0x02, 0x1a,
31 0x05, 0x00, 0x04, 0x14
35 0x30, 0x21, 0x30, 0x09, 0x06, 0x05,
36 0x2b, 0x24, 0x03, 0x02, 0x01,
37 0x05, 0x00, 0x04, 0x14
41 0x30, 0x2d, 0x30, 0x0d, 0x06, 0x09,
42 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04,
43 0x05, 0x00, 0x04, 0x1c
47 0x30, 0x31, 0x30, 0x0d, 0x06, 0x09,
48 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01,
49 0x05, 0x00, 0x04, 0x20
53 0x30, 0x41, 0x30, 0x0d, 0x06, 0x09,
54 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02,
55 0x05, 0x00, 0x04, 0x30
59 0x30, 0x51, 0x30, 0x0d, 0x06, 0x09,
60 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03,
61 0x05, 0x00, 0x04, 0x40
65 0x30, 0x31, 0x30, 0x0d, 0x06, 0x09,
66 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x08,
67 0x05, 0x00, 0x04, 0x20
71 0x30, 0x41, 0x30, 0x0d, 0x06, 0x09,
72 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x09,
73 0x05, 0x00, 0x04, 0x30
77 0x30, 0x51, 0x30, 0x0d, 0x06, 0x09,
78 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x0A,
79 0x05, 0x00, 0x04, 0x40
109 if (strcmp(name, p->name) == 0) in rsa_lookup_asn1()
136 ctx->key_size = 0; in pkcs1pad_set_pub_key()
148 return 0; in pkcs1pad_set_pub_key()
157 ctx->key_size = 0; in pkcs1pad_set_priv_key()
169 return 0; in pkcs1pad_set_priv_key()
274 req_ctx->in_buf[0] = 0x02; in pkcs1pad_encrypt()
277 req_ctx->in_buf[ps_end] = 0x00; in pkcs1pad_encrypt()
316 if (out_buf[0] != 0x00) in pkcs1pad_decrypt_complete()
317 /* Decrypted value had no leading 0 byte */ in pkcs1pad_decrypt_complete()
324 if (out_buf[0] != 0x02) in pkcs1pad_decrypt_complete()
328 if (out_buf[pos] == 0x00) in pkcs1pad_decrypt_complete()
334 err = 0; in pkcs1pad_decrypt_complete()
406 unsigned int ps_end, digest_info_size = 0; in pkcs1pad_sign()
428 req_ctx->in_buf[0] = 0x01; in pkcs1pad_sign()
429 memset(req_ctx->in_buf + 1, 0xff, ps_end - 1); in pkcs1pad_sign()
430 req_ctx->in_buf[ps_end] = 0x00; in pkcs1pad_sign()
478 if (out_buf[0] != 0x00) in pkcs1pad_verify_complete()
479 /* Decrypted value had no leading 0 byte */ in pkcs1pad_verify_complete()
487 if (out_buf[0] != 0x01) in pkcs1pad_verify_complete()
491 if (out_buf[pos] != 0xff) in pkcs1pad_verify_complete()
494 if (pos < 9 || pos == dst_len || out_buf[pos] != 0x00) in pkcs1pad_verify_complete()
508 err = 0; in pkcs1pad_verify_complete()
522 digest_size) != 0) in pkcs1pad_verify_complete()
545 * defined in RFC2313 section 10.2 except that block type 0 is not accepted,
602 return 0; in pkcs1pad_init_tfm()
641 crypto_attr_alg_name(tb[1]), 0, mask); in pkcs1pad_create()
647 if (strcmp(rsa_alg->base.cra_name, "rsa") != 0) { in pkcs1pad_create()