rsa-pkcs1-sha1-using-pss-key-no-params.pem 1.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. This is the same test as rsa-pkcs1-sha1.pem, except the SPKI has been modified
  2. so that the key algorithm is rsaPss (1.2.840.113549.1.1.10) with absent
  3. parameters.
  4. Subsequently this should fail, as a PSS key should not be used with a signature
  5. algorithm for PKCS#1 v1.5.
  6. $ openssl asn1parse -i < [PUBLIC KEY]
  7. 0:d=0 hl=3 l= 157 cons: SEQUENCE
  8. 3:d=1 hl=2 l= 11 cons: SEQUENCE
  9. 5:d=2 hl=2 l= 9 prim: OBJECT :rsassaPss
  10. 16:d=1 hl=3 l= 141 prim: BIT STRING
  11. -----BEGIN PUBLIC KEY-----
  12. MIGdMAsGCSqGSIb3DQEBCgOBjQAwgYkCgYEApW5KDnAQF1iaUYfcfqhB0Vby7A42rVKkTf6x5h9
  13. 62ZHYxRBW/+2xYrTA8oOhKoijlN/1JqtykcuzB86r/OCx39XNlQgJbVsri2311nHvY3fAkhyyPC
  14. cKcOJZjm/4nRnxBazC0/DLNfKSgOE4a29kxO8i4eHyDQzoz/siSb2aITcCAwEAAQ==
  15. -----END PUBLIC KEY-----
  16. $ openssl asn1parse -i < [ALGORITHM]
  17. 0:d=0 hl=2 l= 13 cons: SEQUENCE
  18. 2:d=1 hl=2 l= 9 prim: OBJECT :sha1WithRSAEncryption
  19. 13:d=1 hl=2 l= 0 prim: NULL
  20. -----BEGIN ALGORITHM-----
  21. MA0GCSqGSIb3DQEBBQUA
  22. -----END ALGORITHM-----
  23. -----BEGIN DATA-----
  24. zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu
  25. jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc
  26. vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY
  27. pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A==
  28. -----END DATA-----
  29. $ openssl asn1parse -i < [SIGNATURE]
  30. 0:d=0 hl=3 l= 129 prim: BIT STRING
  31. -----BEGIN SIGNATURE-----
  32. A4GBAGvDoGZWhCkwokfjDVhktNgZI2unxollhirX28TiSvKOhrtTHwM1i+X7dHd8YIb4UMrviT8
  33. Nb8wtDJHsATaTtOoAuAzUmqxOy1+JEa/lOa2kqPOCPR0T5HLRSQVHxlnHYX89JAh9228rcglhZ/
  34. wJfKsY6aRY/LY0zc6O41iUxITX
  35. -----END SIGNATURE-----