xref: /aosp_15_r20/external/tink/proto/rsa_ssa_pss.proto (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang// Copyright 2018 Google Inc.
2*e7b1675dSTing-Kang Chang//
3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang//
7*e7b1675dSTing-Kang Chang//      http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang//
9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang// limitations under the License.
14*e7b1675dSTing-Kang Chang//
15*e7b1675dSTing-Kang Chang////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang// Definitions for RSA SSA (Signature Schemes with Appendix) using PSS
18*e7b1675dSTing-Kang Chang// (Probabilistic Signature Scheme ) encoding
19*e7b1675dSTing-Kang Chang// (https://tools.ietf.org/html/rfc8017#section-8.1).
20*e7b1675dSTing-Kang Changsyntax = "proto3";
21*e7b1675dSTing-Kang Chang
22*e7b1675dSTing-Kang Changpackage google.crypto.tink;
23*e7b1675dSTing-Kang Chang
24*e7b1675dSTing-Kang Changimport "proto/common.proto";
25*e7b1675dSTing-Kang Chang
26*e7b1675dSTing-Kang Changoption java_package = "com.google.crypto.tink.proto";
27*e7b1675dSTing-Kang Changoption java_multiple_files = true;
28*e7b1675dSTing-Kang Changoption go_package = "github.com/google/tink/go/proto/rsa_ssa_pss_go_proto";
29*e7b1675dSTing-Kang Chang
30*e7b1675dSTing-Kang Changmessage RsaSsaPssParams {
31*e7b1675dSTing-Kang Chang  // Hash function used in computing hash of the signing message
32*e7b1675dSTing-Kang Chang  // (see https://tools.ietf.org/html/rfc8017#section-9.1.1).
33*e7b1675dSTing-Kang Chang  // Required.
34*e7b1675dSTing-Kang Chang  HashType sig_hash = 1;
35*e7b1675dSTing-Kang Chang  // Hash function used in MGF1 (a mask generation function based on a
36*e7b1675dSTing-Kang Chang  // hash function) (see https://tools.ietf.org/html/rfc8017#appendix-B.2.1).
37*e7b1675dSTing-Kang Chang  // Required.
38*e7b1675dSTing-Kang Chang  HashType mgf1_hash = 2;
39*e7b1675dSTing-Kang Chang  // Salt length (see https://tools.ietf.org/html/rfc8017#section-9.1.1)
40*e7b1675dSTing-Kang Chang  // Required.
41*e7b1675dSTing-Kang Chang  int32 salt_length = 3;
42*e7b1675dSTing-Kang Chang}
43*e7b1675dSTing-Kang Chang
44*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPssPublicKey
45*e7b1675dSTing-Kang Changmessage RsaSsaPssPublicKey {
46*e7b1675dSTing-Kang Chang  // Required.
47*e7b1675dSTing-Kang Chang  uint32 version = 1;
48*e7b1675dSTing-Kang Chang  // Required.
49*e7b1675dSTing-Kang Chang  RsaSsaPssParams params = 2;
50*e7b1675dSTing-Kang Chang  // Modulus.
51*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
52*e7b1675dSTing-Kang Chang  bytes n = 3;
53*e7b1675dSTing-Kang Chang  // Public exponent.
54*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
55*e7b1675dSTing-Kang Chang  bytes e = 4;
56*e7b1675dSTing-Kang Chang}
57*e7b1675dSTing-Kang Chang
58*e7b1675dSTing-Kang Chang// key_type: type.googleapis.com/google.crypto.tink.RsaSsaPssPrivateKey
59*e7b1675dSTing-Kang Changmessage RsaSsaPssPrivateKey {
60*e7b1675dSTing-Kang Chang  // Required.
61*e7b1675dSTing-Kang Chang  uint32 version = 1;
62*e7b1675dSTing-Kang Chang  // Required.
63*e7b1675dSTing-Kang Chang  RsaSsaPssPublicKey public_key = 2;
64*e7b1675dSTing-Kang Chang  // Private exponent.
65*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
66*e7b1675dSTing-Kang Chang  // Required.
67*e7b1675dSTing-Kang Chang  bytes d = 3;
68*e7b1675dSTing-Kang Chang
69*e7b1675dSTing-Kang Chang  // The following parameters are used to optimize RSA signature computation.
70*e7b1675dSTing-Kang Chang  // The prime factor p of n.
71*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
72*e7b1675dSTing-Kang Chang  // Required.
73*e7b1675dSTing-Kang Chang  bytes p = 4;
74*e7b1675dSTing-Kang Chang  // The prime factor q of n.
75*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
76*e7b1675dSTing-Kang Chang  // Required.
77*e7b1675dSTing-Kang Chang  bytes q = 5;
78*e7b1675dSTing-Kang Chang  // d mod (p - 1).
79*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
80*e7b1675dSTing-Kang Chang  // Required.
81*e7b1675dSTing-Kang Chang  bytes dp = 6;
82*e7b1675dSTing-Kang Chang  // d mod (q - 1).
83*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
84*e7b1675dSTing-Kang Chang  // Required.
85*e7b1675dSTing-Kang Chang  bytes dq = 7;
86*e7b1675dSTing-Kang Chang  // Chinese Remainder Theorem coefficient q^(-1) mod p.
87*e7b1675dSTing-Kang Chang  // Unsigned big integer in bigendian representation.
88*e7b1675dSTing-Kang Chang  // Required.
89*e7b1675dSTing-Kang Chang  bytes crt = 8;
90*e7b1675dSTing-Kang Chang}
91*e7b1675dSTing-Kang Chang
92*e7b1675dSTing-Kang Changmessage RsaSsaPssKeyFormat {
93*e7b1675dSTing-Kang Chang  // Required.
94*e7b1675dSTing-Kang Chang  RsaSsaPssParams params = 1;
95*e7b1675dSTing-Kang Chang  // Required.
96*e7b1675dSTing-Kang Chang  uint32 modulus_size_in_bits = 2;
97*e7b1675dSTing-Kang Chang  // Required.
98*e7b1675dSTing-Kang Chang  bytes public_exponent = 3;
99*e7b1675dSTing-Kang Chang}
100