Update V8 to version 4.6.48.
[chromium-blink-merge.git] / net / data / verify_signed_data_unittest / rsa-pkcs1-sha1-bad-key-der-null.pem
blob59559f44878c2d8e8e892198c5732ac96ac56cb2
1 Same test as rsa-pkcs1-sha1.pem except an extra NULL (0x05, 0x00) has been
2 appended to the SPKI.
4 The DER can still be parsed, however it should fail due to the unconsumed data
5 at the end.
9 -----BEGIN PUBLIC KEY-----
10 MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQClbkoOcBAXWJpRh9x+qEHRVvLsDjatUqRN/rH
11 mH3rZkdjFEFb/7bFitMDyg6EqiKOU3/Umq3KRy7MHzqv84LHf1c2VCAltWyuLbfXWce9jd8CSHL
12 I8Jwpw4lmOb/idGfEFrMLT8Ms18pKA4Thrb2TE7yLh4fINDOjP+yJJvZohNwIDAQABBQA=
13 -----END PUBLIC KEY-----
15 $ openssl asn1parse -i < [PUBLIC KEY]
16     0:d=0  hl=3 l= 159 cons: SEQUENCE          
17     3:d=1  hl=2 l=  13 cons:  SEQUENCE          
18     5:d=2  hl=2 l=   9 prim:   OBJECT            :rsaEncryption
19    16:d=2  hl=2 l=   0 prim:   NULL              
20    18:d=1  hl=3 l= 141 prim:  BIT STRING        
21   162:d=0  hl=2 l=   0 prim: NULL              
25 -----BEGIN ALGORITHM-----
26 MA0GCSqGSIb3DQEBBQUA
27 -----END ALGORITHM-----
29 $ openssl asn1parse -i < [ALGORITHM]
30     0:d=0  hl=2 l=  13 cons: SEQUENCE          
31     2:d=1  hl=2 l=   9 prim:  OBJECT            :sha1WithRSAEncryption
32    13:d=1  hl=2 l=   0 prim:  NULL              
36 -----BEGIN DATA-----
37 zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu
38 jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc
39 vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY
40 pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A==
41 -----END DATA-----
45 -----BEGIN SIGNATURE-----
46 A4GBAGvDoGZWhCkwokfjDVhktNgZI2unxollhirX28TiSvKOhrtTHwM1i+X7dHd8YIb4UMrviT8
47 Nb8wtDJHsATaTtOoAuAzUmqxOy1+JEa/lOa2kqPOCPR0T5HLRSQVHxlnHYX89JAh9228rcglhZ/
48 wJfKsY6aRY/LY0zc6O41iUxITX
49 -----END SIGNATURE-----
51 $ openssl asn1parse -i < [SIGNATURE]
52     0:d=0  hl=3 l= 129 prim: BIT STRING