1Same as rsa-pss-sha1-wrong-salt.pem except the ALGORITHM has been changed to 2have a salt of 23. When verified using this algorithm it will fail, however if 3the default salt of 20 were used it would succeed. 4 5 6 7-----BEGIN PUBLIC KEY----- 8MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQClbkoOcBAXWJpRh9x+qEHRVvLsDjatUqRN/rH 9mH3rZkdjFEFb/7bFitMDyg6EqiKOU3/Umq3KRy7MHzqv84LHf1c2VCAltWyuLbfXWce9jd8CSHL 10I8Jwpw4lmOb/idGfEFrMLT8Ms18pKA4Thrb2TE7yLh4fINDOjP+yJJvZohNwIDAQAB 11-----END PUBLIC KEY----- 12 13$ openssl asn1parse -i < [PUBLIC KEY] 14 0:d=0 hl=3 l= 159 cons: SEQUENCE 15 3:d=1 hl=2 l= 13 cons: SEQUENCE 16 5:d=2 hl=2 l= 9 prim: OBJECT :rsaEncryption 17 16:d=2 hl=2 l= 0 prim: NULL 18 18:d=1 hl=3 l= 141 prim: BIT STRING 19 20 21 22-----BEGIN ALGORITHM----- 23MBIGCSqGSIb3DQEBCjAFogMCARc= 24-----END ALGORITHM----- 25 26$ openssl asn1parse -i < [ALGORITHM] 27 0:d=0 hl=2 l= 18 cons: SEQUENCE 28 2:d=1 hl=2 l= 9 prim: OBJECT :rsassaPss 29 13:d=1 hl=2 l= 5 cons: SEQUENCE 30 15:d=2 hl=2 l= 3 cons: cont [ 2 ] 31 17:d=3 hl=2 l= 1 prim: INTEGER :17 32 33 34 35-----BEGIN DATA----- 36zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu 37jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc 38vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY 39pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A== 40-----END DATA----- 41 42 43 44-----BEGIN SIGNATURE----- 45A4GBAJB0MI+1mOlwGyKUOI5S+XH6rCtgpRRa8YXfUoe17SiH5Xzn/UTchjTkB8jg5DYLwibz7CJ 46/nZ5UY46NMfUFEhXfbrucL5V5qndZijj5FLW5wb2DxOL584Kg0Ko1Qv/uZZhKYBvGnrKN6yfcoS 47yCwtTD9mzVAPH/K5lNik4wy7M8 48-----END SIGNATURE----- 49 50$ openssl asn1parse -i < [SIGNATURE] 51 0:d=0 hl=3 l= 129 prim: BIT STRING 52