1This is the same test as ecdsa-prime256v1-sha512.pem except the public key's
2algorithm has been tampered with. The parameters for ecPublicKey should be a
3namedCurve, but here they have been replaced by NULL.
4
5
6$ openssl asn1parse -i < [PUBLIC KEY]
7    0:d=0  hl=2 l=  81 cons: SEQUENCE
8    2:d=1  hl=2 l=  11 cons:  SEQUENCE
9    4:d=2  hl=2 l=   7 prim:   OBJECT            :id-ecPublicKey
10   13:d=2  hl=2 l=   0 prim:   NULL
11   15:d=1  hl=2 l=  66 prim:  BIT STRING
12-----BEGIN PUBLIC KEY-----
13MFEwCwYHKoZIzj0CAQUAA0IABJywz2kwPa/HYdTkaHtOzwOebTSrlkr4CBDY1VikqNb3LVEjOhe
14IkgqG7gihlix576MX+3h54pfa0hRtuZX6HHg=
15-----END PUBLIC KEY-----
16
17$ openssl asn1parse -i < [ALGORITHM]
18    0:d=0  hl=2 l=  10 cons: SEQUENCE
19    2:d=1  hl=2 l=   8 prim:  OBJECT            :ecdsa-with-SHA512
20-----BEGIN ALGORITHM-----
21MAoGCCqGSM49BAME
22-----END ALGORITHM-----
23
24-----BEGIN DATA-----
25bikyFTMBpO72gOZCiSmtrpiMEI1mijH/VdBImUfXX/gaRr+J6E1kAfAjvm6HaI+814TXhcqEZzV
26SSstS0ARSyEBApHnnzDMJNkQdk7vnIqlDKm4dsRK1yUA7ECcssTR/1hnUY/ep0iOtdv3gbYpog1
27APuEMjWr/5jiQb37VTjD4=
28-----END DATA-----
29
30$ openssl asn1parse -i < [SIGNATURE]
31    0:d=0  hl=2 l=  71 prim: BIT STRING
32-----BEGIN SIGNATURE-----
33A0cAMEQCIEufkeQoUocmGh0ckjz2Gc1SwXXP5/G+YKUljGEDSLo9AiAoxF+QHXHEGymGOOwNaoX
34X/LDDO7/sWpyBCEa2OSiahA==
35-----END SIGNATURE-----
36