1 Same test as rsa-pkcs1-sha1.pem, except the SPKI has been modified so the
2 algorithm parameters are absent rather than NULL.
4 This should fail because RFC 3279 says the parameters MUST be NULL.
8 -----BEGIN PUBLIC KEY-----
9 MIGdMAsGCSqGSIb3DQEBAQOBjQAwgYkCgYEApW5KDnAQF1iaUYfcfqhB0Vby7A42rVKkTf6x5h9
10 62ZHYxRBW/+2xYrTA8oOhKoijlN/1JqtykcuzB86r/OCx39XNlQgJbVsri2311nHvY3fAkhyyPC
11 cKcOJZjm/4nRnxBazC0/DLNfKSgOE4a29kxO8i4eHyDQzoz/siSb2aITcCAwEAAQ==
12 -----END PUBLIC KEY-----
14 $ openssl asn1parse -i < [PUBLIC KEY]
15 0:d=0 hl=3 l= 157 cons: SEQUENCE
16 3:d=1 hl=2 l= 11 cons: SEQUENCE
17 5:d=2 hl=2 l= 9 prim: OBJECT :rsaEncryption
18 16:d=1 hl=3 l= 141 prim: BIT STRING
22 -----BEGIN ALGORITHM-----
24 -----END ALGORITHM-----
26 $ openssl asn1parse -i < [ALGORITHM]
27 0:d=0 hl=2 l= 13 cons: SEQUENCE
28 2:d=1 hl=2 l= 9 prim: OBJECT :sha1WithRSAEncryption
29 13:d=1 hl=2 l= 0 prim: NULL
34 zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu
35 jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc
36 vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY
37 pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A==
42 -----BEGIN SIGNATURE-----
43 A4GBAGvDoGZWhCkwokfjDVhktNgZI2unxollhirX28TiSvKOhrtTHwM1i+X7dHd8YIb4UMrviT8
44 Nb8wtDJHsATaTtOoAuAzUmqxOy1+JEa/lOa2kqPOCPR0T5HLRSQVHxlnHYX89JAh9228rcglhZ/
45 wJfKsY6aRY/LY0zc6O41iUxITX
46 -----END SIGNATURE-----
48 $ openssl asn1parse -i < [SIGNATURE]
49 0:d=0 hl=3 l= 129 prim: BIT STRING