rsa-pkcs1-sha1-key-params-absent.pem 1.6 KB

123456789101112131415161718192021222324252627282930313233343536373839
  1. Same test as rsa-pkcs1-sha1.pem, except the SPKI has been modified so the
  2. algorithm parameters are absent rather than NULL.
  3. This should fail because RFC 3279 says the parameters MUST be NULL.
  4. $ openssl asn1parse -i < [PUBLIC KEY]
  5. 0:d=0 hl=3 l= 157 cons: SEQUENCE
  6. 3:d=1 hl=2 l= 11 cons: SEQUENCE
  7. 5:d=2 hl=2 l= 9 prim: OBJECT :rsaEncryption
  8. 16:d=1 hl=3 l= 141 prim: BIT STRING
  9. -----BEGIN PUBLIC KEY-----
  10. MIGdMAsGCSqGSIb3DQEBAQOBjQAwgYkCgYEApW5KDnAQF1iaUYfcfqhB0Vby7A42rVKkTf6x5h9
  11. 62ZHYxRBW/+2xYrTA8oOhKoijlN/1JqtykcuzB86r/OCx39XNlQgJbVsri2311nHvY3fAkhyyPC
  12. cKcOJZjm/4nRnxBazC0/DLNfKSgOE4a29kxO8i4eHyDQzoz/siSb2aITcCAwEAAQ==
  13. -----END PUBLIC KEY-----
  14. $ openssl asn1parse -i < [ALGORITHM]
  15. 0:d=0 hl=2 l= 13 cons: SEQUENCE
  16. 2:d=1 hl=2 l= 9 prim: OBJECT :sha1WithRSAEncryption
  17. 13:d=1 hl=2 l= 0 prim: NULL
  18. -----BEGIN ALGORITHM-----
  19. MA0GCSqGSIb3DQEBBQUA
  20. -----END ALGORITHM-----
  21. -----BEGIN DATA-----
  22. zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu
  23. jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc
  24. vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY
  25. pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A==
  26. -----END DATA-----
  27. $ openssl asn1parse -i < [SIGNATURE]
  28. 0:d=0 hl=3 l= 129 prim: BIT STRING
  29. -----BEGIN SIGNATURE-----
  30. A4GBAGvDoGZWhCkwokfjDVhktNgZI2unxollhirX28TiSvKOhrtTHwM1i+X7dHd8YIb4UMrviT8
  31. Nb8wtDJHsATaTtOoAuAzUmqxOy1+JEa/lOa2kqPOCPR0T5HLRSQVHxlnHYX89JAh9228rcglhZ/
  32. wJfKsY6aRY/LY0zc6O41iUxITX
  33. -----END SIGNATURE-----