Refactor WebsiteSettings to operate on a SecurityInfo
[chromium-blink-merge.git] / net / data / verify_signed_data_unittest / rsa-pkcs1-sha1-key-params-absent.pem
blob10cc3d06d9ed34a533c18dd492063dbc6361d80b
1 Same test as rsa-pkcs1-sha1.pem, except the SPKI has been modified so the
2 algorithm parameters are absent rather than NULL.
4 This should fail because RFC 3279 says the parameters MUST be NULL.
8 -----BEGIN PUBLIC KEY-----
9 MIGdMAsGCSqGSIb3DQEBAQOBjQAwgYkCgYEApW5KDnAQF1iaUYfcfqhB0Vby7A42rVKkTf6x5h9
10 62ZHYxRBW/+2xYrTA8oOhKoijlN/1JqtykcuzB86r/OCx39XNlQgJbVsri2311nHvY3fAkhyyPC
11 cKcOJZjm/4nRnxBazC0/DLNfKSgOE4a29kxO8i4eHyDQzoz/siSb2aITcCAwEAAQ==
12 -----END PUBLIC KEY-----
14 $ openssl asn1parse -i < [PUBLIC KEY]
15     0:d=0  hl=3 l= 157 cons: SEQUENCE          
16     3:d=1  hl=2 l=  11 cons:  SEQUENCE          
17     5:d=2  hl=2 l=   9 prim:   OBJECT            :rsaEncryption
18    16:d=1  hl=3 l= 141 prim:  BIT STRING        
22 -----BEGIN ALGORITHM-----
23 MA0GCSqGSIb3DQEBBQUA
24 -----END ALGORITHM-----
26 $ openssl asn1parse -i < [ALGORITHM]
27     0:d=0  hl=2 l=  13 cons: SEQUENCE          
28     2:d=1  hl=2 l=   9 prim:  OBJECT            :sha1WithRSAEncryption
29    13:d=1  hl=2 l=   0 prim:  NULL              
33 -----BEGIN DATA-----
34 zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu
35 jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc
36 vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY
37 pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A==
38 -----END DATA-----
42 -----BEGIN SIGNATURE-----
43 A4GBAGvDoGZWhCkwokfjDVhktNgZI2unxollhirX28TiSvKOhrtTHwM1i+X7dHd8YIb4UMrviT8
44 Nb8wtDJHsATaTtOoAuAzUmqxOy1+JEa/lOa2kqPOCPR0T5HLRSQVHxlnHYX89JAh9228rcglhZ/
45 wJfKsY6aRY/LY0zc6O41iUxITX
46 -----END SIGNATURE-----
48 $ openssl asn1parse -i < [SIGNATURE]
49     0:d=0  hl=3 l= 129 prim: BIT STRING