xref: /aosp_15_r20/external/tink/proto/jwt_rsa_ssa_pkcs1.proto (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang// Copyright 2020 Google LLC
2*e7b1675dSTing-Kang Chang//
3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang//
7*e7b1675dSTing-Kang Chang//      http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang//
9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang// limitations under the License.
14*e7b1675dSTing-Kang Chang//
15*e7b1675dSTing-Kang Chang////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Changsyntax = "proto3";
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Changpackage google.crypto.tink;
20*e7b1675dSTing-Kang Chang
21*e7b1675dSTing-Kang Changoption java_package = "com.google.crypto.tink.proto";
22*e7b1675dSTing-Kang Changoption java_multiple_files = true;
23*e7b1675dSTing-Kang Changoption go_package = "github.com/google/tink/go/proto/rsa_ssa_pkcs1_go_proto";
24*e7b1675dSTing-Kang Chang
25*e7b1675dSTing-Kang Chang// See https://datatracker.ietf.org/doc/html/rfc7518#section-3.3
26*e7b1675dSTing-Kang Changenum JwtRsaSsaPkcs1Algorithm {
27*e7b1675dSTing-Kang Chang  RS_UNKNOWN = 0;
28*e7b1675dSTing-Kang Chang  RS256 = 1;  // RSASSA-PKCS1-v1_5 using SHA-256
29*e7b1675dSTing-Kang Chang  RS384 = 2;  // RSASSA-PKCS1-v1_5 using SHA-384
30*e7b1675dSTing-Kang Chang  RS512 = 3;  // RSASSA-PKCS1-v1_5 using SHA-512
31*e7b1675dSTing-Kang Chang}
32*e7b1675dSTing-Kang Chang
33*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.JwtRsaSsaPkcs1PublicKey
34*e7b1675dSTing-Kang Changmessage JwtRsaSsaPkcs1PublicKey {
35*e7b1675dSTing-Kang Chang  uint32 version = 1;
36*e7b1675dSTing-Kang Chang  JwtRsaSsaPkcs1Algorithm algorithm = 2;
37*e7b1675dSTing-Kang Chang  // Modulus.
38*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
39*e7b1675dSTing-Kang Chang  bytes n = 3;
40*e7b1675dSTing-Kang Chang  // Public exponent.
41*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
42*e7b1675dSTing-Kang Chang  bytes e = 4;
43*e7b1675dSTing-Kang Chang
44*e7b1675dSTing-Kang Chang  // Optional, custom kid header value to be used with "RAW" keys.
45*e7b1675dSTing-Kang Chang  // "TINK" keys with this value set will be rejected.
46*e7b1675dSTing-Kang Chang  message CustomKid {
47*e7b1675dSTing-Kang Chang    string value = 1;
48*e7b1675dSTing-Kang Chang  }
49*e7b1675dSTing-Kang Chang  CustomKid custom_kid = 5;
50*e7b1675dSTing-Kang Chang}
51*e7b1675dSTing-Kang Chang
52*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPkcs1PrivateKey
53*e7b1675dSTing-Kang Changmessage JwtRsaSsaPkcs1PrivateKey {
54*e7b1675dSTing-Kang Chang  uint32 version = 1;
55*e7b1675dSTing-Kang Chang  JwtRsaSsaPkcs1PublicKey public_key = 2;
56*e7b1675dSTing-Kang Chang  // Private exponent.
57*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
58*e7b1675dSTing-Kang Chang  bytes d = 3;
59*e7b1675dSTing-Kang Chang
60*e7b1675dSTing-Kang Chang  // The following parameters are used to optimize RSA signature computation.
61*e7b1675dSTing-Kang Chang  // The prime factor p of n.
62*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
63*e7b1675dSTing-Kang Chang  bytes p = 4;
64*e7b1675dSTing-Kang Chang  // The prime factor q of n.
65*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
66*e7b1675dSTing-Kang Chang  bytes q = 5;
67*e7b1675dSTing-Kang Chang  // d mod (p - 1).
68*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
69*e7b1675dSTing-Kang Chang  bytes dp = 6;
70*e7b1675dSTing-Kang Chang  // d mod (q - 1).
71*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
72*e7b1675dSTing-Kang Chang  bytes dq = 7;
73*e7b1675dSTing-Kang Chang  // Chinese Remainder Theorem coefficient q^(-1) mod p.
74*e7b1675dSTing-Kang Chang  // Unsigned big integer in big-endian representation.
75*e7b1675dSTing-Kang Chang  bytes crt = 8;
76*e7b1675dSTing-Kang Chang}
77*e7b1675dSTing-Kang Chang
78*e7b1675dSTing-Kang Changmessage JwtRsaSsaPkcs1KeyFormat {
79*e7b1675dSTing-Kang Chang  uint32 version = 1;
80*e7b1675dSTing-Kang Chang  JwtRsaSsaPkcs1Algorithm algorithm = 2;
81*e7b1675dSTing-Kang Chang  uint32 modulus_size_in_bits = 3;
82*e7b1675dSTing-Kang Chang  bytes public_exponent = 4;
83*e7b1675dSTing-Kang Chang}
84