1*e7b1675dSTing-Kang Chang// Copyright 2018 Google Inc. 2*e7b1675dSTing-Kang Chang// 3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang// 7*e7b1675dSTing-Kang Chang// http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang// 9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang// limitations under the License. 14*e7b1675dSTing-Kang Chang// 15*e7b1675dSTing-Kang Chang//////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Chang// Definitions for RSA SSA (Signature Schemes with Appendix) using PSS 18*e7b1675dSTing-Kang Chang// (Probabilistic Signature Scheme ) encoding 19*e7b1675dSTing-Kang Chang// (https://tools.ietf.org/html/rfc8017#section-8.1). 20*e7b1675dSTing-Kang Changsyntax = "proto3"; 21*e7b1675dSTing-Kang Chang 22*e7b1675dSTing-Kang Changpackage google.crypto.tink; 23*e7b1675dSTing-Kang Chang 24*e7b1675dSTing-Kang Changimport "proto/common.proto"; 25*e7b1675dSTing-Kang Chang 26*e7b1675dSTing-Kang Changoption java_package = "com.google.crypto.tink.proto"; 27*e7b1675dSTing-Kang Changoption java_multiple_files = true; 28*e7b1675dSTing-Kang Changoption go_package = "github.com/google/tink/go/proto/rsa_ssa_pss_go_proto"; 29*e7b1675dSTing-Kang Chang 30*e7b1675dSTing-Kang Changmessage RsaSsaPssParams { 31*e7b1675dSTing-Kang Chang // Hash function used in computing hash of the signing message 32*e7b1675dSTing-Kang Chang // (see https://tools.ietf.org/html/rfc8017#section-9.1.1). 33*e7b1675dSTing-Kang Chang // Required. 34*e7b1675dSTing-Kang Chang HashType sig_hash = 1; 35*e7b1675dSTing-Kang Chang // Hash function used in MGF1 (a mask generation function based on a 36*e7b1675dSTing-Kang Chang // hash function) (see https://tools.ietf.org/html/rfc8017#appendix-B.2.1). 37*e7b1675dSTing-Kang Chang // Required. 38*e7b1675dSTing-Kang Chang HashType mgf1_hash = 2; 39*e7b1675dSTing-Kang Chang // Salt length (see https://tools.ietf.org/html/rfc8017#section-9.1.1) 40*e7b1675dSTing-Kang Chang // Required. 41*e7b1675dSTing-Kang Chang int32 salt_length = 3; 42*e7b1675dSTing-Kang Chang} 43*e7b1675dSTing-Kang Chang 44*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPssPublicKey 45*e7b1675dSTing-Kang Changmessage RsaSsaPssPublicKey { 46*e7b1675dSTing-Kang Chang // Required. 47*e7b1675dSTing-Kang Chang uint32 version = 1; 48*e7b1675dSTing-Kang Chang // Required. 49*e7b1675dSTing-Kang Chang RsaSsaPssParams params = 2; 50*e7b1675dSTing-Kang Chang // Modulus. 51*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 52*e7b1675dSTing-Kang Chang bytes n = 3; 53*e7b1675dSTing-Kang Chang // Public exponent. 54*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 55*e7b1675dSTing-Kang Chang bytes e = 4; 56*e7b1675dSTing-Kang Chang} 57*e7b1675dSTing-Kang Chang 58*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPssPrivateKey 59*e7b1675dSTing-Kang Changmessage RsaSsaPssPrivateKey { 60*e7b1675dSTing-Kang Chang // Required. 61*e7b1675dSTing-Kang Chang uint32 version = 1; 62*e7b1675dSTing-Kang Chang // Required. 63*e7b1675dSTing-Kang Chang RsaSsaPssPublicKey public_key = 2; 64*e7b1675dSTing-Kang Chang // Private exponent. 65*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 66*e7b1675dSTing-Kang Chang // Required. 67*e7b1675dSTing-Kang Chang bytes d = 3; 68*e7b1675dSTing-Kang Chang 69*e7b1675dSTing-Kang Chang // The following parameters are used to optimize RSA signature computation. 70*e7b1675dSTing-Kang Chang // The prime factor p of n. 71*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 72*e7b1675dSTing-Kang Chang // Required. 73*e7b1675dSTing-Kang Chang bytes p = 4; 74*e7b1675dSTing-Kang Chang // The prime factor q of n. 75*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 76*e7b1675dSTing-Kang Chang // Required. 77*e7b1675dSTing-Kang Chang bytes q = 5; 78*e7b1675dSTing-Kang Chang // d mod (p - 1). 79*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 80*e7b1675dSTing-Kang Chang // Required. 81*e7b1675dSTing-Kang Chang bytes dp = 6; 82*e7b1675dSTing-Kang Chang // d mod (q - 1). 83*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 84*e7b1675dSTing-Kang Chang // Required. 85*e7b1675dSTing-Kang Chang bytes dq = 7; 86*e7b1675dSTing-Kang Chang // Chinese Remainder Theorem coefficient q^(-1) mod p. 87*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 88*e7b1675dSTing-Kang Chang // Required. 89*e7b1675dSTing-Kang Chang bytes crt = 8; 90*e7b1675dSTing-Kang Chang} 91*e7b1675dSTing-Kang Chang 92*e7b1675dSTing-Kang Changmessage RsaSsaPssKeyFormat { 93*e7b1675dSTing-Kang Chang // Required. 94*e7b1675dSTing-Kang Chang RsaSsaPssParams params = 1; 95*e7b1675dSTing-Kang Chang // Required. 96*e7b1675dSTing-Kang Chang uint32 modulus_size_in_bits = 2; 97*e7b1675dSTing-Kang Chang // Required. 98*e7b1675dSTing-Kang Chang bytes public_exponent = 3; 99*e7b1675dSTing-Kang Chang} 100