xref: /aosp_15_r20/external/tink/proto/rsa_ssa_pkcs1.proto (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang// Copyright 2018 Google Inc.
2*e7b1675dSTing-Kang Chang//
3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang//
7*e7b1675dSTing-Kang Chang//      http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang//
9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang// limitations under the License.
14*e7b1675dSTing-Kang Chang//
15*e7b1675dSTing-Kang Chang////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang// Definitions for RSA SSA (Signature Schemes with Appendix) using PKCS1-v1_5
18*e7b1675dSTing-Kang Chang// encoding (https://tools.ietf.org/html/rfc8017#section-8.2).
19*e7b1675dSTing-Kang Changsyntax = "proto3";
20*e7b1675dSTing-Kang Chang
21*e7b1675dSTing-Kang Changpackage google.crypto.tink;
22*e7b1675dSTing-Kang Chang
23*e7b1675dSTing-Kang Changimport "proto/common.proto";
24*e7b1675dSTing-Kang Chang
25*e7b1675dSTing-Kang Changoption java_package = "com.google.crypto.tink.proto";
26*e7b1675dSTing-Kang Changoption java_multiple_files = true;
27*e7b1675dSTing-Kang Changoption go_package = "github.com/google/tink/go/proto/rsa_ssa_pkcs1_go_proto";
28*e7b1675dSTing-Kang Chang
29*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1Params {
30*e7b1675dSTing-Kang Chang  // Hash function used in computing hash of the signing message
31*e7b1675dSTing-Kang Chang  // (see https://tools.ietf.org/html/rfc8017#section-9.2).
32*e7b1675dSTing-Kang Chang  // Required.
33*e7b1675dSTing-Kang Chang  HashType hash_type = 1;
34*e7b1675dSTing-Kang Chang}
35*e7b1675dSTing-Kang Chang
36*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPkcs1PublicKey
37*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1PublicKey {
38*e7b1675dSTing-Kang Chang  // Required.
39*e7b1675dSTing-Kang Chang  uint32 version = 1;
40*e7b1675dSTing-Kang Chang  // Required.
41*e7b1675dSTing-Kang Chang  RsaSsaPkcs1Params params = 2;
42*e7b1675dSTing-Kang Chang  // Modulus.
43*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
44*e7b1675dSTing-Kang Chang  bytes n = 3;
45*e7b1675dSTing-Kang Chang  // Public exponent.
46*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
47*e7b1675dSTing-Kang Chang  bytes e = 4;
48*e7b1675dSTing-Kang Chang}
49*e7b1675dSTing-Kang Chang
50*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPkcs1PrivateKey
51*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1PrivateKey {
52*e7b1675dSTing-Kang Chang  // Required.
53*e7b1675dSTing-Kang Chang  uint32 version = 1;
54*e7b1675dSTing-Kang Chang  // Required.
55*e7b1675dSTing-Kang Chang  RsaSsaPkcs1PublicKey public_key = 2;
56*e7b1675dSTing-Kang Chang  // Private exponent.
57*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
58*e7b1675dSTing-Kang Chang  // Required.
59*e7b1675dSTing-Kang Chang  bytes d = 3;
60*e7b1675dSTing-Kang Chang
61*e7b1675dSTing-Kang Chang  // The following parameters are used to optimize RSA signature computation.
62*e7b1675dSTing-Kang Chang  // The prime factor p of n.
63*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
64*e7b1675dSTing-Kang Chang  // Required.
65*e7b1675dSTing-Kang Chang  bytes p = 4;
66*e7b1675dSTing-Kang Chang  // The prime factor q of n.
67*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
68*e7b1675dSTing-Kang Chang  // Required.
69*e7b1675dSTing-Kang Chang  bytes q = 5;
70*e7b1675dSTing-Kang Chang  // d mod (p - 1).
71*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
72*e7b1675dSTing-Kang Chang  // Required.
73*e7b1675dSTing-Kang Chang  bytes dp = 6;
74*e7b1675dSTing-Kang Chang  // d mod (q - 1).
75*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
76*e7b1675dSTing-Kang Chang  // Required.
77*e7b1675dSTing-Kang Chang  bytes dq = 7;
78*e7b1675dSTing-Kang Chang  // Chinese Remainder Theorem coefficient q^(-1) mod p.
79*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
80*e7b1675dSTing-Kang Chang  // Required.
81*e7b1675dSTing-Kang Chang  bytes crt = 8;
82*e7b1675dSTing-Kang Chang}
83*e7b1675dSTing-Kang Chang
84*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1KeyFormat {
85*e7b1675dSTing-Kang Chang  // Required.
86*e7b1675dSTing-Kang Chang  RsaSsaPkcs1Params params = 1;
87*e7b1675dSTing-Kang Chang  // Required.
88*e7b1675dSTing-Kang Chang  uint32 modulus_size_in_bits = 2;
89*e7b1675dSTing-Kang Chang  // Required.
90*e7b1675dSTing-Kang Chang  bytes public_exponent = 3;
91*e7b1675dSTing-Kang Chang}
92