blob: 2645719c43524fb1201f1c4b800d91ebaa328b00 [file] [log] [blame]
// Copyright 2018 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
package com.google.crypto.tink.signature;
import com.google.crypto.tink.KeyTemplate;
import com.google.crypto.tink.KeyTypeManager;
import com.google.crypto.tink.PrivateKeyTypeManager;
import com.google.crypto.tink.PublicKeySign;
import com.google.crypto.tink.Registry;
import com.google.crypto.tink.proto.HashType;
import com.google.crypto.tink.proto.KeyData.KeyMaterialType;
import com.google.crypto.tink.proto.RsaSsaPssKeyFormat;
import com.google.crypto.tink.proto.RsaSsaPssParams;
import com.google.crypto.tink.proto.RsaSsaPssPrivateKey;
import com.google.crypto.tink.proto.RsaSsaPssPublicKey;
import com.google.crypto.tink.signature.internal.SigUtil;
import com.google.crypto.tink.subtle.EngineFactory;
import com.google.crypto.tink.subtle.RsaSsaPssSignJce;
import com.google.crypto.tink.subtle.SelfKeyTestValidators;
import com.google.crypto.tink.subtle.Validators;
import com.google.protobuf.ByteString;
import com.google.protobuf.ExtensionRegistryLite;
import com.google.protobuf.InvalidProtocolBufferException;
import java.math.BigInteger;
import java.security.GeneralSecurityException;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.interfaces.RSAPrivateCrtKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.RSAKeyGenParameterSpec;
import java.security.spec.RSAPrivateCrtKeySpec;
import java.security.spec.RSAPublicKeySpec;
import java.util.Collections;
import java.util.HashMap;
import java.util.Map;
/**
* This key manager generates new {@code RsaSsaPssPrivateKey} keys and produces new instances of
* {@code RsaSsaPssSignJce}.
*/
public final class RsaSsaPssSignKeyManager
extends PrivateKeyTypeManager<RsaSsaPssPrivateKey, RsaSsaPssPublicKey> {
RsaSsaPssSignKeyManager() {
super(
RsaSsaPssPrivateKey.class,
RsaSsaPssPublicKey.class,
new KeyTypeManager.PrimitiveFactory<PublicKeySign, RsaSsaPssPrivateKey>(
PublicKeySign.class) {
@Override
public PublicKeySign getPrimitive(RsaSsaPssPrivateKey keyProto)
throws GeneralSecurityException {
java.security.KeyFactory kf = EngineFactory.KEY_FACTORY.getInstance("RSA");
RSAPrivateCrtKey privateKey =
(RSAPrivateCrtKey)
kf.generatePrivate(
new RSAPrivateCrtKeySpec(
new BigInteger(1, keyProto.getPublicKey().getN().toByteArray()),
new BigInteger(1, keyProto.getPublicKey().getE().toByteArray()),
new BigInteger(1, keyProto.getD().toByteArray()),
new BigInteger(1, keyProto.getP().toByteArray()),
new BigInteger(1, keyProto.getQ().toByteArray()),
new BigInteger(1, keyProto.getDp().toByteArray()),
new BigInteger(1, keyProto.getDq().toByteArray()),
new BigInteger(1, keyProto.getCrt().toByteArray())));
RsaSsaPssParams params = keyProto.getPublicKey().getParams();
RSAPublicKey publicKey =
(RSAPublicKey)
kf.generatePublic(
new RSAPublicKeySpec(
new BigInteger(1, keyProto.getPublicKey().getN().toByteArray()),
new BigInteger(1, keyProto.getPublicKey().getE().toByteArray())));
SelfKeyTestValidators.validateRsaSsaPss(
privateKey,
publicKey,
SigUtil.toHashType(params.getSigHash()),
SigUtil.toHashType(params.getMgf1Hash()),
params.getSaltLength());
return new RsaSsaPssSignJce(
privateKey,
SigUtil.toHashType(params.getSigHash()),
SigUtil.toHashType(params.getMgf1Hash()),
params.getSaltLength());
}
});
}
@Override
public String getKeyType() {
return "type.googleapis.com/google.crypto.tink.RsaSsaPssPrivateKey";
}
@Override
public int getVersion() {
return 0;
}
@Override
public RsaSsaPssPublicKey getPublicKey(RsaSsaPssPrivateKey privKeyProto)
throws GeneralSecurityException {
return privKeyProto.getPublicKey();
}
@Override
public KeyMaterialType keyMaterialType() {
return KeyMaterialType.ASYMMETRIC_PRIVATE;
}
@Override
public RsaSsaPssPrivateKey parseKey(ByteString byteString) throws InvalidProtocolBufferException {
return RsaSsaPssPrivateKey.parseFrom(byteString, ExtensionRegistryLite.getEmptyRegistry());
}
@Override
public void validateKey(RsaSsaPssPrivateKey keyProto) throws GeneralSecurityException {
Validators.validateVersion(keyProto.getVersion(), getVersion());
Validators.validateRsaModulusSize(
new BigInteger(1, keyProto.getPublicKey().getN().toByteArray()).bitLength());
Validators.validateRsaPublicExponent(
new BigInteger(1, keyProto.getPublicKey().getE().toByteArray()));
SigUtil.validateRsaSsaPssParams(keyProto.getPublicKey().getParams());
}
@Override
public KeyFactory<RsaSsaPssKeyFormat, RsaSsaPssPrivateKey> keyFactory() {
return new KeyFactory<RsaSsaPssKeyFormat, RsaSsaPssPrivateKey>(RsaSsaPssKeyFormat.class) {
@Override
public void validateKeyFormat(RsaSsaPssKeyFormat format) throws GeneralSecurityException {
SigUtil.validateRsaSsaPssParams(format.getParams());
Validators.validateRsaModulusSize(format.getModulusSizeInBits());
Validators.validateRsaPublicExponent(
new BigInteger(1, format.getPublicExponent().toByteArray()));
}
@Override
public RsaSsaPssKeyFormat parseKeyFormat(ByteString byteString)
throws InvalidProtocolBufferException {
return RsaSsaPssKeyFormat.parseFrom(byteString, ExtensionRegistryLite.getEmptyRegistry());
}
@Override
public RsaSsaPssPrivateKey createKey(RsaSsaPssKeyFormat format)
throws GeneralSecurityException {
RsaSsaPssParams params = format.getParams();
Validators.validateRsaModulusSize(format.getModulusSizeInBits());
Validators.validateSignatureHash(SigUtil.toHashType(params.getSigHash()));
KeyPairGenerator keyGen = EngineFactory.KEY_PAIR_GENERATOR.getInstance("RSA");
RSAKeyGenParameterSpec spec =
new RSAKeyGenParameterSpec(
format.getModulusSizeInBits(),
new BigInteger(1, format.getPublicExponent().toByteArray()));
keyGen.initialize(spec);
KeyPair keyPair = keyGen.generateKeyPair();
RSAPublicKey pubKey = (RSAPublicKey) keyPair.getPublic();
RSAPrivateCrtKey privKey = (RSAPrivateCrtKey) keyPair.getPrivate();
// Creates RsaSsaPssPublicKey.
RsaSsaPssPublicKey pssPubKey =
RsaSsaPssPublicKey.newBuilder()
.setVersion(getVersion())
.setParams(params)
.setE(ByteString.copyFrom(pubKey.getPublicExponent().toByteArray()))
.setN(ByteString.copyFrom(pubKey.getModulus().toByteArray()))
.build();
// Creates RsaSsaPssPrivateKey.
return RsaSsaPssPrivateKey.newBuilder()
.setVersion(getVersion())
.setPublicKey(pssPubKey)
.setD(ByteString.copyFrom(privKey.getPrivateExponent().toByteArray()))
.setP(ByteString.copyFrom(privKey.getPrimeP().toByteArray()))
.setQ(ByteString.copyFrom(privKey.getPrimeQ().toByteArray()))
.setDp(ByteString.copyFrom(privKey.getPrimeExponentP().toByteArray()))
.setDq(ByteString.copyFrom(privKey.getPrimeExponentQ().toByteArray()))
.setCrt(ByteString.copyFrom(privKey.getCrtCoefficient().toByteArray()))
.build();
}
@Override
public Map<String, KeyFactory.KeyFormat<RsaSsaPssKeyFormat>> keyFormats()
throws GeneralSecurityException {
Map<String, KeyFactory.KeyFormat<RsaSsaPssKeyFormat>> result = new HashMap<>();
result.put(
"RSA_SSA_PSS_3072_SHA256_F4",
new KeyFormat<>(
createKeyFormat(
HashType.SHA256,
HashType.SHA256,
/*saltLength=*/ 32,
/*modulusSize=*/ 3072,
RSAKeyGenParameterSpec.F4),
KeyTemplate.OutputPrefixType.TINK));
result.put(
"RSA_SSA_PSS_3072_SHA256_F4_RAW",
new KeyFormat<>(
createKeyFormat(
HashType.SHA256,
HashType.SHA256,
/*saltLength=*/ 32,
/*modulusSize=*/ 3072,
RSAKeyGenParameterSpec.F4),
KeyTemplate.OutputPrefixType.RAW));
// This is identical to RSA_SSA_PSS_3072_SHA256_F4. It is needed to maintain backward
// compatibility with SignatureKeyTemplates.
// TODO(b/185475349): remove this in Tink 2.0.0.
result.put(
"RSA_SSA_PSS_3072_SHA256_SHA256_32_F4",
new KeyFormat<>(
createKeyFormat(
HashType.SHA256,
HashType.SHA256,
/*saltLength=*/ 32,
/*modulusSize=*/ 3072,
RSAKeyGenParameterSpec.F4),
KeyTemplate.OutputPrefixType.TINK));
result.put(
"RSA_SSA_PSS_4096_SHA512_F4",
new KeyFormat<>(
createKeyFormat(
HashType.SHA512,
HashType.SHA512,
/*saltLength=*/ 64,
/*modulusSize=*/ 4096,
RSAKeyGenParameterSpec.F4),
KeyTemplate.OutputPrefixType.TINK));
result.put(
"RSA_SSA_PSS_4096_SHA512_F4_RAW",
new KeyFormat<>(
createKeyFormat(
HashType.SHA512,
HashType.SHA512,
/*saltLength=*/ 64,
/*modulusSize=*/ 4096,
RSAKeyGenParameterSpec.F4),
KeyTemplate.OutputPrefixType.RAW));
// This is identical to RSA_SSA_PSS_4096_SHA512_F4. It is needed to maintain backward
// compatibility with SignatureKeyTemplates.
// TODO(b/185475349): remove this in Tink 2.0.0.
result.put(
"RSA_SSA_PSS_4096_SHA512_SHA512_64_F4",
new KeyFormat<>(
createKeyFormat(
HashType.SHA512,
HashType.SHA512,
/*saltLength=*/ 64,
/*modulusSize=*/ 4096,
RSAKeyGenParameterSpec.F4),
KeyTemplate.OutputPrefixType.TINK));
return Collections.unmodifiableMap(result);
}
};
}
/**
* Registers the {@link RsaSsaPssSignKeyManager} and the {@link RsaSsaPssVerifyKeyManager} with
* the registry, so that the the RsaSsaPss-Keys can be used with Tink.
*/
public static void registerPair(boolean newKeyAllowed) throws GeneralSecurityException {
Registry.registerAsymmetricKeyManagers(
new RsaSsaPssSignKeyManager(), new RsaSsaPssVerifyKeyManager(), newKeyAllowed);
}
/**
* @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the
* following parameters:
* <ul>
* <li>Signature hash: SHA256.
* <li>MGF1 hash: SHA256.
* <li>Salt length: 32 (i.e., SHA256's output length).
* <li>Modulus size: 3072 bit.
* <li>Public exponent: 65537 (aka F4).
* <li>Prefix type: {@link KeyTemplate.OutputPrefixType#TINK}.
* </ul>
* @deprecated use {@code KeyTemplates.get("RSA_SSA_PSS_3072_SHA256_F4")}
*/
@Deprecated
public static final KeyTemplate rsa3072PssSha256F4Template() {
return createKeyTemplate(
HashType.SHA256,
HashType.SHA256,
/*saltLength=*/ 32,
/*modulusSize=*/ 3072,
RSAKeyGenParameterSpec.F4,
KeyTemplate.OutputPrefixType.TINK);
}
/**
* @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the
* following parameters:
* <ul>
* <li>Signature hash: SHA256.
* <li>MGF1 hash: SHA256.
* <li>Salt length: 32 (i.e., SHA256's output length).
* <li>Modulus size: 3072 bit.
* <li>Public exponent: 65537 (aka F4).
* <li>Prefix type: {@link KeyTemplate.OutputPrefixType#RAW} (no prefix).
* </ul>
* <p>Keys generated from this template create signatures compatible with OpenSSL and other
* libraries.
* @deprecated use {@code KeyTemplates.get("RSA_SSA_PSS_3072_SHA256_F4_RAW")}
*/
@Deprecated
public static final KeyTemplate rawRsa3072PssSha256F4Template() {
return createKeyTemplate(
HashType.SHA256,
HashType.SHA256,
/*saltLength=*/ 32,
/*modulusSize=*/ 3072,
RSAKeyGenParameterSpec.F4,
KeyTemplate.OutputPrefixType.RAW);
}
/**
* @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the
* following parameters:
* <ul>
* <li>Signature hash: SHA512.
* <li>MGF1 hash: SHA512.
* <li>Salt length: 64 (i.e., SHA512's output length).
* <li>Modulus size: 4096 bit.
* <li>Public exponent: 65537 (aka F4).
* <li>Prefix type: {@link KeyTemplate.OutputPrefixType#TINK}.
* </ul>
* @deprecated use {@code KeyTemplates.get("RSA_SSA_PSS_4096_SHA512_F4")}
*/
@Deprecated
public static final KeyTemplate rsa4096PssSha512F4Template() {
return createKeyTemplate(
HashType.SHA512,
HashType.SHA512,
/*saltLength=*/ 64,
/*modulusSize=*/ 4096,
RSAKeyGenParameterSpec.F4,
KeyTemplate.OutputPrefixType.TINK);
}
/**
* @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the
* following parameters:
* <ul>
* <li>Signature hash: SHA512.
* <li>MGF1 hash: SHA512.
* <li>Salt length: 64 (i.e., SHA512's output length).
* <li>Modulus size: 4096 bit.
* <li>Public exponent: 65537 (aka F4).
* <li>Prefix type: {@link KeyTemplate.OutputPrefixType#RAW} (no prefix).
* </ul>
* <p>Keys generated from this template create signatures compatible with OpenSSL and other
* libraries.
* @deprecated use {@code KeyTemplates.get("RSA_SSA_PSS_4096_SHA512_F4_RAW")}
*/
@Deprecated
public static final KeyTemplate rawRsa4096PssSha512F4Template() {
return createKeyTemplate(
HashType.SHA512,
HashType.SHA512,
/*saltLength=*/ 64,
/*modulusSize=*/ 4096,
RSAKeyGenParameterSpec.F4,
KeyTemplate.OutputPrefixType.RAW);
}
/**
* @return a {@link KeyTemplate} containing a {@link RsaSsaPssKeyFormat} with some specified
* parameters.
*/
private static KeyTemplate createKeyTemplate(
HashType sigHash,
HashType mgf1Hash,
int saltLength,
int modulusSize,
BigInteger publicExponent,
KeyTemplate.OutputPrefixType prefixType) {
RsaSsaPssKeyFormat format =
createKeyFormat(sigHash, mgf1Hash, saltLength, modulusSize, publicExponent);
return KeyTemplate.create(
new RsaSsaPssSignKeyManager().getKeyType(), format.toByteArray(), prefixType);
}
private static RsaSsaPssKeyFormat createKeyFormat(
HashType sigHash,
HashType mgf1Hash,
int saltLength,
int modulusSize,
BigInteger publicExponent) {
RsaSsaPssParams params =
RsaSsaPssParams.newBuilder()
.setSigHash(sigHash)
.setMgf1Hash(mgf1Hash)
.setSaltLength(saltLength)
.build();
return RsaSsaPssKeyFormat.newBuilder()
.setParams(params)
.setModulusSizeInBits(modulusSize)
.setPublicExponent(ByteString.copyFrom(publicExponent.toByteArray()))
.build();
}
}