ecdsa-prime256v1-sha512-spki-params-null.pem 1.3 KB

1234567891011121314151617181920212223242526272829303132333435
  1. This is the same test as ecdsa-prime256v1-sha512.pem except the public key's
  2. algorithm has been tampered with. The parameters for ecPublicKey should be a
  3. namedCurve, but here they have been replaced by NULL.
  4. $ openssl asn1parse -i < [PUBLIC KEY]
  5. 0:d=0 hl=2 l= 81 cons: SEQUENCE
  6. 2:d=1 hl=2 l= 11 cons: SEQUENCE
  7. 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
  8. 13:d=2 hl=2 l= 0 prim: NULL
  9. 15:d=1 hl=2 l= 66 prim: BIT STRING
  10. -----BEGIN PUBLIC KEY-----
  11. MFEwCwYHKoZIzj0CAQUAA0IABJywz2kwPa/HYdTkaHtOzwOebTSrlkr4CBDY1VikqNb3LVEjOhe
  12. IkgqG7gihlix576MX+3h54pfa0hRtuZX6HHg=
  13. -----END PUBLIC KEY-----
  14. $ openssl asn1parse -i < [ALGORITHM]
  15. 0:d=0 hl=2 l= 10 cons: SEQUENCE
  16. 2:d=1 hl=2 l= 8 prim: OBJECT :ecdsa-with-SHA512
  17. -----BEGIN ALGORITHM-----
  18. MAoGCCqGSM49BAME
  19. -----END ALGORITHM-----
  20. -----BEGIN DATA-----
  21. bikyFTMBpO72gOZCiSmtrpiMEI1mijH/VdBImUfXX/gaRr+J6E1kAfAjvm6HaI+814TXhcqEZzV
  22. SSstS0ARSyEBApHnnzDMJNkQdk7vnIqlDKm4dsRK1yUA7ECcssTR/1hnUY/ep0iOtdv3gbYpog1
  23. APuEMjWr/5jiQb37VTjD4=
  24. -----END DATA-----
  25. $ openssl asn1parse -i < [SIGNATURE]
  26. 0:d=0 hl=2 l= 71 prim: BIT STRING
  27. -----BEGIN SIGNATURE-----
  28. A0cAMEQCIEufkeQoUocmGh0ckjz2Gc1SwXXP5/G+YKUljGEDSLo9AiAoxF+QHXHEGymGOOwNaoX
  29. X/LDDO7/sWpyBCEa2OSiahA==
  30. -----END SIGNATURE-----