xref: /aosp_15_r20/external/tink/cc/internal/rsa_util.h (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang // Copyright 2021 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang //     http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang #ifndef TINK_INTERNAL_RSA_UTIL_H_
17*e7b1675dSTing-Kang Chang #define TINK_INTERNAL_RSA_UTIL_H_
18*e7b1675dSTing-Kang Chang 
19*e7b1675dSTing-Kang Chang #include <stddef.h>
20*e7b1675dSTing-Kang Chang 
21*e7b1675dSTing-Kang Chang #include <string>
22*e7b1675dSTing-Kang Chang 
23*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h"
24*e7b1675dSTing-Kang Chang #include "openssl/bn.h"
25*e7b1675dSTing-Kang Chang #include "openssl/rsa.h"
26*e7b1675dSTing-Kang Chang #include "tink/internal/ssl_unique_ptr.h"
27*e7b1675dSTing-Kang Chang #include "tink/subtle/common_enums.h"
28*e7b1675dSTing-Kang Chang #include "tink/util/secret_data.h"
29*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
30*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
31*e7b1675dSTing-Kang Chang 
32*e7b1675dSTing-Kang Chang namespace crypto {
33*e7b1675dSTing-Kang Chang namespace tink {
34*e7b1675dSTing-Kang Chang namespace internal {
35*e7b1675dSTing-Kang Chang 
36*e7b1675dSTing-Kang Chang struct RsaPublicKey {
37*e7b1675dSTing-Kang Chang   // Modulus.
38*e7b1675dSTing-Kang Chang   // Unsigned big integer in bigendian representation.
39*e7b1675dSTing-Kang Chang   std::string n;
40*e7b1675dSTing-Kang Chang   // Public exponent.
41*e7b1675dSTing-Kang Chang   // Unsigned big integer in bigendian representation.
42*e7b1675dSTing-Kang Chang   std::string e;
43*e7b1675dSTing-Kang Chang };
44*e7b1675dSTing-Kang Chang 
45*e7b1675dSTing-Kang Chang // Parameters of RSA SSA (Signature Schemes with Appendix) using  PSS
46*e7b1675dSTing-Kang Chang // (Probabilistic Signature Scheme) encoding (see
47*e7b1675dSTing-Kang Chang // https://tools.ietf.org/html/rfc8017#section-8.1).
48*e7b1675dSTing-Kang Chang struct RsaSsaPssParams {
49*e7b1675dSTing-Kang Chang   // Hash function used in computing hash of the signing message
50*e7b1675dSTing-Kang Chang   // (see https://tools.ietf.org/html/rfc8017#section-9.1.1).
51*e7b1675dSTing-Kang Chang   subtle::HashType sig_hash;
52*e7b1675dSTing-Kang Chang   // Hash function used in MGF1 (a mask generation function based on a
53*e7b1675dSTing-Kang Chang   // hash function) (see https://tools.ietf.org/html/rfc8017#appendix-B.2.1).
54*e7b1675dSTing-Kang Chang   subtle::HashType mgf1_hash;
55*e7b1675dSTing-Kang Chang   // Salt length (see https://tools.ietf.org/html/rfc8017#section-9.1.1)
56*e7b1675dSTing-Kang Chang   int salt_length;
57*e7b1675dSTing-Kang Chang };
58*e7b1675dSTing-Kang Chang 
59*e7b1675dSTing-Kang Chang // Parameters of RSA SSA (Signature Schemes with Appendix) using PKCS1
60*e7b1675dSTing-Kang Chang // (Probabilistic Signature Scheme) encoding (see
61*e7b1675dSTing-Kang Chang // https://tools.ietf.org/html/rfc8017#section-8.2).
62*e7b1675dSTing-Kang Chang struct RsaSsaPkcs1Params {
63*e7b1675dSTing-Kang Chang   // Hash function used in computing hash of the signing message
64*e7b1675dSTing-Kang Chang   // (see https://tools.ietf.org/html/rfc8017#section-9.2).
65*e7b1675dSTing-Kang Chang   subtle::HashType hash_type;
66*e7b1675dSTing-Kang Chang };
67*e7b1675dSTing-Kang Chang 
68*e7b1675dSTing-Kang Chang // RSA private key representation.
69*e7b1675dSTing-Kang Chang struct RsaPrivateKey {
70*e7b1675dSTing-Kang Chang   // Modulus.
71*e7b1675dSTing-Kang Chang   std::string n;
72*e7b1675dSTing-Kang Chang   // Public exponent.
73*e7b1675dSTing-Kang Chang   std::string e;
74*e7b1675dSTing-Kang Chang   // Private exponent.
75*e7b1675dSTing-Kang Chang   // Unsigned big integer in bigendian representation.
76*e7b1675dSTing-Kang Chang   util::SecretData d;
77*e7b1675dSTing-Kang Chang 
78*e7b1675dSTing-Kang Chang   // The prime factor p of n.
79*e7b1675dSTing-Kang Chang   // Unsigned big integer in bigendian representation.
80*e7b1675dSTing-Kang Chang   util::SecretData p;
81*e7b1675dSTing-Kang Chang   // The prime factor q of n.
82*e7b1675dSTing-Kang Chang   // Unsigned big integer in bigendian representation.
83*e7b1675dSTing-Kang Chang   util::SecretData q;
84*e7b1675dSTing-Kang Chang   // d mod (p - 1).
85*e7b1675dSTing-Kang Chang   util::SecretData dp;
86*e7b1675dSTing-Kang Chang   // d mod (q - 1).
87*e7b1675dSTing-Kang Chang   // Unsigned big integer in bigendian representation.
88*e7b1675dSTing-Kang Chang   util::SecretData dq;
89*e7b1675dSTing-Kang Chang   // Chinese Remainder Theorem coefficient q^(-1) mod p.
90*e7b1675dSTing-Kang Chang   // Unsigned big integer in bigendian representation.
91*e7b1675dSTing-Kang Chang   util::SecretData crt;
92*e7b1675dSTing-Kang Chang };
93*e7b1675dSTing-Kang Chang 
94*e7b1675dSTing-Kang Chang // Validates whether 'modulus_size' is at least 2048-bit.
95*e7b1675dSTing-Kang Chang // To reach 128-bit security strength, RSA's modulus must be at least
96*e7b1675dSTing-Kang Chang // 3072-bit while 2048-bit RSA key only has 112-bit security. Nevertheless,
97*e7b1675dSTing-Kang Chang // a 2048-bit RSA key is considered safe by NIST until 2030 (see
98*e7b1675dSTing-Kang Chang // https://www.keylength.com/en/4/).
99*e7b1675dSTing-Kang Chang crypto::tink::util::Status ValidateRsaModulusSize(size_t modulus_size);
100*e7b1675dSTing-Kang Chang 
101*e7b1675dSTing-Kang Chang // Validates whether `exponent` is a valid bignum, is odd, greater than 65536
102*e7b1675dSTing-Kang Chang // and smaller than 32 bits. The primes p and q are chosen such that (p-1)(q-1)
103*e7b1675dSTing-Kang Chang // is relatively prime to the public exponent. Therefore, the public exponent
104*e7b1675dSTing-Kang Chang // must be odd. Furthermore, choosing a public exponent which is not greater
105*e7b1675dSTing-Kang Chang // than 65536 can lead to weak instantiations of RSA. A public exponent which is
106*e7b1675dSTing-Kang Chang // odd and greater than 65536 conforms to the requirements set by NIST FIPS
107*e7b1675dSTing-Kang Chang // 186-4 (Appendix B.3.1).
108*e7b1675dSTing-Kang Chang crypto::tink::util::Status ValidateRsaPublicExponent(const BIGNUM *exponent);
109*e7b1675dSTing-Kang Chang 
110*e7b1675dSTing-Kang Chang // Validates whether `exponent` is a valid bignum, is odd, greater than 65536
111*e7b1675dSTing-Kang Chang // and smaller than 32 bits.
112*e7b1675dSTing-Kang Chang crypto::tink::util::Status ValidateRsaPublicExponent(
113*e7b1675dSTing-Kang Chang     absl::string_view exponent);
114*e7b1675dSTing-Kang Chang 
115*e7b1675dSTing-Kang Chang // Creates a new RSA key pair and populates `private_key` and `public_key`.
116*e7b1675dSTing-Kang Chang crypto::tink::util::Status NewRsaKeyPair(int modulus_size_in_bits,
117*e7b1675dSTing-Kang Chang                                          const BIGNUM *e,
118*e7b1675dSTing-Kang Chang                                          RsaPrivateKey *private_key,
119*e7b1675dSTing-Kang Chang                                          RsaPublicKey *public_key);
120*e7b1675dSTing-Kang Chang 
121*e7b1675dSTing-Kang Chang // Returns `key`'s private and public exponents (d and e) and mosulus
122*e7b1675dSTing-Kang Chang // (n) writing a copy of them into `rsa`.
123*e7b1675dSTing-Kang Chang crypto::tink::util::Status GetRsaModAndExponents(const RsaPrivateKey &key,
124*e7b1675dSTing-Kang Chang                                                  RSA *rsa);
125*e7b1675dSTing-Kang Chang 
126*e7b1675dSTing-Kang Chang // Returns `key`'s prime factors (p and q) writing a copy of them into `rsa`.
127*e7b1675dSTing-Kang Chang crypto::tink::util::Status GetRsaPrimeFactors(const RsaPrivateKey &key,
128*e7b1675dSTing-Kang Chang                                               RSA *rsa);
129*e7b1675dSTing-Kang Chang 
130*e7b1675dSTing-Kang Chang // Returns `key`'s CRT parameters (dp and dq) writing a copy of them into `rsa`.
131*e7b1675dSTing-Kang Chang crypto::tink::util::Status GetRsaCrtParams(const RsaPrivateKey &key, RSA *rsa);
132*e7b1675dSTing-Kang Chang 
133*e7b1675dSTing-Kang Chang // Creates a OpenSSL/BoringSSL RSA key from `private_key`.
134*e7b1675dSTing-Kang Chang crypto::tink::util::StatusOr<internal::SslUniquePtr<RSA>> RsaPrivateKeyToRsa(
135*e7b1675dSTing-Kang Chang     const RsaPrivateKey &private_key);
136*e7b1675dSTing-Kang Chang 
137*e7b1675dSTing-Kang Chang // Creates a OpenSSL/BoringSSL RSA key from an `public_key`.
138*e7b1675dSTing-Kang Chang crypto::tink::util::StatusOr<internal::SslUniquePtr<RSA>> RsaPublicKeyToRsa(
139*e7b1675dSTing-Kang Chang     const RsaPublicKey &public_key);
140*e7b1675dSTing-Kang Chang 
141*e7b1675dSTing-Kang Chang // Performs some basic checks on the given RSA public key `key` as in [1] when
142*e7b1675dSTing-Kang Chang // OpenSSL is used as a backend. This is needed because with OpenSSL calls to
143*e7b1675dSTing-Kang Chang // RSA_check_key with RSA keys that have only the modulus and public exponent
144*e7b1675dSTing-Kang Chang // populated don't work [2]. When BoringSSL is used, it uses BoringSSL's
145*e7b1675dSTing-Kang Chang // RSA_check_key.
146*e7b1675dSTing-Kang Chang //
147*e7b1675dSTing-Kang Chang // [1] https://github.com/google/boringssl/blob/master/crypto/fipsmodule/rsa/rsa_impl.c#L76
148*e7b1675dSTing-Kang Chang // [2] https://www.openssl.org/docs/man1.1.1/man3/RSA_check_key.html
149*e7b1675dSTing-Kang Chang crypto::tink::util::Status RsaCheckPublicKey(const RSA *key);
150*e7b1675dSTing-Kang Chang 
151*e7b1675dSTing-Kang Chang }  // namespace internal
152*e7b1675dSTing-Kang Chang }  // namespace tink
153*e7b1675dSTing-Kang Chang }  // namespace crypto
154*e7b1675dSTing-Kang Chang 
155*e7b1675dSTing-Kang Chang #endif  // TINK_INTERNAL_RSA_UTIL_H_
156