1*e7b1675dSTing-Kang Chang// Copyright 2018 Google Inc. 2*e7b1675dSTing-Kang Chang// 3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang// 7*e7b1675dSTing-Kang Chang// http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang// 9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang// limitations under the License. 14*e7b1675dSTing-Kang Chang// 15*e7b1675dSTing-Kang Chang//////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Chang// Definitions for RSA SSA (Signature Schemes with Appendix) using PKCS1-v1_5 18*e7b1675dSTing-Kang Chang// encoding (https://tools.ietf.org/html/rfc8017#section-8.2). 19*e7b1675dSTing-Kang Changsyntax = "proto3"; 20*e7b1675dSTing-Kang Chang 21*e7b1675dSTing-Kang Changpackage google.crypto.tink; 22*e7b1675dSTing-Kang Chang 23*e7b1675dSTing-Kang Changimport "proto/common.proto"; 24*e7b1675dSTing-Kang Chang 25*e7b1675dSTing-Kang Changoption java_package = "com.google.crypto.tink.proto"; 26*e7b1675dSTing-Kang Changoption java_multiple_files = true; 27*e7b1675dSTing-Kang Changoption go_package = "github.com/google/tink/go/proto/rsa_ssa_pkcs1_go_proto"; 28*e7b1675dSTing-Kang Chang 29*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1Params { 30*e7b1675dSTing-Kang Chang // Hash function used in computing hash of the signing message 31*e7b1675dSTing-Kang Chang // (see https://tools.ietf.org/html/rfc8017#section-9.2). 32*e7b1675dSTing-Kang Chang // Required. 33*e7b1675dSTing-Kang Chang HashType hash_type = 1; 34*e7b1675dSTing-Kang Chang} 35*e7b1675dSTing-Kang Chang 36*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPkcs1PublicKey 37*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1PublicKey { 38*e7b1675dSTing-Kang Chang // Required. 39*e7b1675dSTing-Kang Chang uint32 version = 1; 40*e7b1675dSTing-Kang Chang // Required. 41*e7b1675dSTing-Kang Chang RsaSsaPkcs1Params params = 2; 42*e7b1675dSTing-Kang Chang // Modulus. 43*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 44*e7b1675dSTing-Kang Chang bytes n = 3; 45*e7b1675dSTing-Kang Chang // Public exponent. 46*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 47*e7b1675dSTing-Kang Chang bytes e = 4; 48*e7b1675dSTing-Kang Chang} 49*e7b1675dSTing-Kang Chang 50*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPkcs1PrivateKey 51*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1PrivateKey { 52*e7b1675dSTing-Kang Chang // Required. 53*e7b1675dSTing-Kang Chang uint32 version = 1; 54*e7b1675dSTing-Kang Chang // Required. 55*e7b1675dSTing-Kang Chang RsaSsaPkcs1PublicKey public_key = 2; 56*e7b1675dSTing-Kang Chang // Private exponent. 57*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 58*e7b1675dSTing-Kang Chang // Required. 59*e7b1675dSTing-Kang Chang bytes d = 3; 60*e7b1675dSTing-Kang Chang 61*e7b1675dSTing-Kang Chang // The following parameters are used to optimize RSA signature computation. 62*e7b1675dSTing-Kang Chang // The prime factor p of n. 63*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 64*e7b1675dSTing-Kang Chang // Required. 65*e7b1675dSTing-Kang Chang bytes p = 4; 66*e7b1675dSTing-Kang Chang // The prime factor q of n. 67*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 68*e7b1675dSTing-Kang Chang // Required. 69*e7b1675dSTing-Kang Chang bytes q = 5; 70*e7b1675dSTing-Kang Chang // d mod (p - 1). 71*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 72*e7b1675dSTing-Kang Chang // Required. 73*e7b1675dSTing-Kang Chang bytes dp = 6; 74*e7b1675dSTing-Kang Chang // d mod (q - 1). 75*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 76*e7b1675dSTing-Kang Chang // Required. 77*e7b1675dSTing-Kang Chang bytes dq = 7; 78*e7b1675dSTing-Kang Chang // Chinese Remainder Theorem coefficient q^(-1) mod p. 79*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 80*e7b1675dSTing-Kang Chang // Required. 81*e7b1675dSTing-Kang Chang bytes crt = 8; 82*e7b1675dSTing-Kang Chang} 83*e7b1675dSTing-Kang Chang 84*e7b1675dSTing-Kang Changmessage RsaSsaPkcs1KeyFormat { 85*e7b1675dSTing-Kang Chang // Required. 86*e7b1675dSTing-Kang Chang RsaSsaPkcs1Params params = 1; 87*e7b1675dSTing-Kang Chang // Required. 88*e7b1675dSTing-Kang Chang uint32 modulus_size_in_bits = 2; 89*e7b1675dSTing-Kang Chang // Required. 90*e7b1675dSTing-Kang Chang bytes public_exponent = 3; 91*e7b1675dSTing-Kang Chang} 92