1 This is the same test as rsa-pkcs1-sha256.pem except the SPKI has been tampered
2 with. Rather than using an rsaEncryption OID for the key's algorithm, it uses
7 -----BEGIN PUBLIC KEY-----
8 MIGaMAgGBFUIAQEFAAOBjQAwgYkCgYEAqkfgdjI9YqzadSZ2Ns0CEEUD8+8m7OplIx094X+QD8m
9 ooNrunwT04asbLIINGL4qiI/+9IVSvyV3Kj9c4EeQIbANGoJ8AI3wf6MOBB/txxGFedqqcTffKV
10 MQvtZdoYFbZ/MQkvyRsoyvunb/pWcN4sSaF9kY1bXSeP3J99fBIYUCAwEAAQ==
11 -----END PUBLIC KEY-----
13 $ openssl asn1parse -i < [PUBLIC KEY]
14 0:d=0 hl=3 l= 154 cons: SEQUENCE
15 3:d=1 hl=2 l= 8 cons: SEQUENCE
16 5:d=2 hl=2 l= 4 prim: OBJECT :rsa
17 11:d=2 hl=2 l= 0 prim: NULL
18 13:d=1 hl=3 l= 141 prim: BIT STRING
22 -----BEGIN ALGORITHM-----
24 -----END ALGORITHM-----
26 $ openssl asn1parse -i < [ALGORITHM]
27 0:d=0 hl=2 l= 13 cons: SEQUENCE
28 2:d=1 hl=2 l= 9 prim: OBJECT :sha256WithRSAEncryption
29 13:d=1 hl=2 l= 0 prim: NULL
34 MIIB46ADAgECAgkA3l4tFOVii0UwDQYJKoZIhvcNAQELBQAwVjELMAkGA1UEBhMCQVUxEzARBgN
35 VBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1
36 UEAwwGTXkga2V5MB4XDTE1MDcwMjE3MDYzOVoXDTE2MDcwMTE3MDYzOVowVjELMAkGA1UEBhMCQ
37 VUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0
38 ZDEPMA0GA1UEAwwGTXkga2V5MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCqR+B2Mj1irNp
39 1JnY2zQIQRQPz7ybs6mUjHT3hf5APyaig2u6fBPThqxssgg0YviqIj/70hVK/JXcqP1zgR5AhsA
40 0agnwAjfB/ow4EH+3HEYV52qpxN98pUxC+1l2hgVtn8xCS/JGyjK+6dv+lZw3ixJoX2RjVtdJ4/
41 cn318EhhQIDAQABo1AwTjAdBgNVHQ4EFgQUzQBVKTEknyLndWd2HTsBdTKvyikwHwYDVR0jBBgw
42 FoAUzQBVKTEknyLndWd2HTsBdTKvyikwDAYDVR0TBAUwAwEB/w==
47 -----BEGIN SIGNATURE-----
48 A4GBADrHSmFSJw/Gv7hs5PNzpaJwAri/sitarIZfzN/SjR+n8L8yeTEoiDb1+BkxlFvXvPHTaOK
49 oO3WlslNNOxh1W5/JkYYGOUkCcyIjnln6qS560imcr3VNjomT/M8M2Iss+rJiKau1TRuaP7H8i6
50 +Gqf3saGdr8/LnvFAdNQvkalQt
51 -----END SIGNATURE-----
53 $ openssl asn1parse -i < [SIGNATURE]
54 0:d=0 hl=3 l= 129 prim: BIT STRING