1This is the same test as ecdsa-prime256v1-sha512.pem except the public key's 2algorithm has been tampered with. The parameters for ecPublicKey should be a 3namedCurve, but here they have been replaced by NULL. 4 5 6$ openssl asn1parse -i < [PUBLIC KEY] 7 0:d=0 hl=2 l= 81 cons: SEQUENCE 8 2:d=1 hl=2 l= 11 cons: SEQUENCE 9 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey 10 13:d=2 hl=2 l= 0 prim: NULL 11 15:d=1 hl=2 l= 66 prim: BIT STRING 12-----BEGIN PUBLIC KEY----- 13MFEwCwYHKoZIzj0CAQUAA0IABJywz2kwPa/HYdTkaHtOzwOebTSrlkr4CBDY1VikqNb3LVEjOhe 14IkgqG7gihlix576MX+3h54pfa0hRtuZX6HHg= 15-----END PUBLIC KEY----- 16 17$ openssl asn1parse -i < [ALGORITHM] 18 0:d=0 hl=2 l= 10 cons: SEQUENCE 19 2:d=1 hl=2 l= 8 prim: OBJECT :ecdsa-with-SHA512 20-----BEGIN ALGORITHM----- 21MAoGCCqGSM49BAME 22-----END ALGORITHM----- 23 24-----BEGIN DATA----- 25bikyFTMBpO72gOZCiSmtrpiMEI1mijH/VdBImUfXX/gaRr+J6E1kAfAjvm6HaI+814TXhcqEZzV 26SSstS0ARSyEBApHnnzDMJNkQdk7vnIqlDKm4dsRK1yUA7ECcssTR/1hnUY/ep0iOtdv3gbYpog1 27APuEMjWr/5jiQb37VTjD4= 28-----END DATA----- 29 30$ openssl asn1parse -i < [SIGNATURE] 31 0:d=0 hl=2 l= 71 prim: BIT STRING 32-----BEGIN SIGNATURE----- 33A0cAMEQCIEufkeQoUocmGh0ckjz2Gc1SwXXP5/G+YKUljGEDSLo9AiAoxF+QHXHEGymGOOwNaoX 34X/LDDO7/sWpyBCEa2OSiahA== 35-----END SIGNATURE----- 36