| Same test as rsa-pkcs1-sha1.pem, except the SPKI has been modified so the |
| algorithm parameters are absent rather than NULL. |
| |
| This should fail because RFC 3279 says the parameters MUST be NULL. |
| |
| |
| $ openssl asn1parse -i < [PUBLIC KEY] |
| 0:d=0 hl=3 l= 157 cons: SEQUENCE |
| 3:d=1 hl=2 l= 11 cons: SEQUENCE |
| 5:d=2 hl=2 l= 9 prim: OBJECT :rsaEncryption |
| 16:d=1 hl=3 l= 141 prim: BIT STRING |
| -----BEGIN PUBLIC KEY----- |
| MIGdMAsGCSqGSIb3DQEBAQOBjQAwgYkCgYEApW5KDnAQF1iaUYfcfqhB0Vby7A42rVKkTf6x5h9 |
| 62ZHYxRBW/+2xYrTA8oOhKoijlN/1JqtykcuzB86r/OCx39XNlQgJbVsri2311nHvY3fAkhyyPC |
| cKcOJZjm/4nRnxBazC0/DLNfKSgOE4a29kxO8i4eHyDQzoz/siSb2aITcCAwEAAQ== |
| -----END PUBLIC KEY----- |
| |
| $ openssl asn1parse -i < [ALGORITHM] |
| 0:d=0 hl=2 l= 13 cons: SEQUENCE |
| 2:d=1 hl=2 l= 9 prim: OBJECT :sha1WithRSAEncryption |
| 13:d=1 hl=2 l= 0 prim: NULL |
| -----BEGIN ALGORITHM----- |
| MA0GCSqGSIb3DQEBBQUA |
| -----END ALGORITHM----- |
| |
| -----BEGIN DATA----- |
| zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu |
| jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc |
| vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY |
| pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A== |
| -----END DATA----- |
| |
| $ openssl asn1parse -i < [SIGNATURE] |
| 0:d=0 hl=3 l= 129 prim: BIT STRING |
| -----BEGIN SIGNATURE----- |
| A4GBAGvDoGZWhCkwokfjDVhktNgZI2unxollhirX28TiSvKOhrtTHwM1i+X7dHd8YIb4UMrviT8 |
| Nb8wtDJHsATaTtOoAuAzUmqxOy1+JEa/lOa2kqPOCPR0T5HLRSQVHxlnHYX89JAh9228rcglhZ/ |
| wJfKsY6aRY/LY0zc6O41iUxITX |
| -----END SIGNATURE----- |