1*e7b1675dSTing-Kang Chang // Copyright 2021 Google LLC 2*e7b1675dSTing-Kang Chang // 3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang // 7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang // 9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang // limitations under the License. 14*e7b1675dSTing-Kang Chang // 15*e7b1675dSTing-Kang Chang /////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang #ifndef TINK_INTERNAL_RSA_UTIL_H_ 17*e7b1675dSTing-Kang Chang #define TINK_INTERNAL_RSA_UTIL_H_ 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Chang #include <stddef.h> 20*e7b1675dSTing-Kang Chang 21*e7b1675dSTing-Kang Chang #include <string> 22*e7b1675dSTing-Kang Chang 23*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h" 24*e7b1675dSTing-Kang Chang #include "openssl/bn.h" 25*e7b1675dSTing-Kang Chang #include "openssl/rsa.h" 26*e7b1675dSTing-Kang Chang #include "tink/internal/ssl_unique_ptr.h" 27*e7b1675dSTing-Kang Chang #include "tink/subtle/common_enums.h" 28*e7b1675dSTing-Kang Chang #include "tink/util/secret_data.h" 29*e7b1675dSTing-Kang Chang #include "tink/util/status.h" 30*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h" 31*e7b1675dSTing-Kang Chang 32*e7b1675dSTing-Kang Chang namespace crypto { 33*e7b1675dSTing-Kang Chang namespace tink { 34*e7b1675dSTing-Kang Chang namespace internal { 35*e7b1675dSTing-Kang Chang 36*e7b1675dSTing-Kang Chang struct RsaPublicKey { 37*e7b1675dSTing-Kang Chang // Modulus. 38*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 39*e7b1675dSTing-Kang Chang std::string n; 40*e7b1675dSTing-Kang Chang // Public exponent. 41*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 42*e7b1675dSTing-Kang Chang std::string e; 43*e7b1675dSTing-Kang Chang }; 44*e7b1675dSTing-Kang Chang 45*e7b1675dSTing-Kang Chang // Parameters of RSA SSA (Signature Schemes with Appendix) using PSS 46*e7b1675dSTing-Kang Chang // (Probabilistic Signature Scheme) encoding (see 47*e7b1675dSTing-Kang Chang // https://tools.ietf.org/html/rfc8017#section-8.1). 48*e7b1675dSTing-Kang Chang struct RsaSsaPssParams { 49*e7b1675dSTing-Kang Chang // Hash function used in computing hash of the signing message 50*e7b1675dSTing-Kang Chang // (see https://tools.ietf.org/html/rfc8017#section-9.1.1). 51*e7b1675dSTing-Kang Chang subtle::HashType sig_hash; 52*e7b1675dSTing-Kang Chang // Hash function used in MGF1 (a mask generation function based on a 53*e7b1675dSTing-Kang Chang // hash function) (see https://tools.ietf.org/html/rfc8017#appendix-B.2.1). 54*e7b1675dSTing-Kang Chang subtle::HashType mgf1_hash; 55*e7b1675dSTing-Kang Chang // Salt length (see https://tools.ietf.org/html/rfc8017#section-9.1.1) 56*e7b1675dSTing-Kang Chang int salt_length; 57*e7b1675dSTing-Kang Chang }; 58*e7b1675dSTing-Kang Chang 59*e7b1675dSTing-Kang Chang // Parameters of RSA SSA (Signature Schemes with Appendix) using PKCS1 60*e7b1675dSTing-Kang Chang // (Probabilistic Signature Scheme) encoding (see 61*e7b1675dSTing-Kang Chang // https://tools.ietf.org/html/rfc8017#section-8.2). 62*e7b1675dSTing-Kang Chang struct RsaSsaPkcs1Params { 63*e7b1675dSTing-Kang Chang // Hash function used in computing hash of the signing message 64*e7b1675dSTing-Kang Chang // (see https://tools.ietf.org/html/rfc8017#section-9.2). 65*e7b1675dSTing-Kang Chang subtle::HashType hash_type; 66*e7b1675dSTing-Kang Chang }; 67*e7b1675dSTing-Kang Chang 68*e7b1675dSTing-Kang Chang // RSA private key representation. 69*e7b1675dSTing-Kang Chang struct RsaPrivateKey { 70*e7b1675dSTing-Kang Chang // Modulus. 71*e7b1675dSTing-Kang Chang std::string n; 72*e7b1675dSTing-Kang Chang // Public exponent. 73*e7b1675dSTing-Kang Chang std::string e; 74*e7b1675dSTing-Kang Chang // Private exponent. 75*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 76*e7b1675dSTing-Kang Chang util::SecretData d; 77*e7b1675dSTing-Kang Chang 78*e7b1675dSTing-Kang Chang // The prime factor p of n. 79*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 80*e7b1675dSTing-Kang Chang util::SecretData p; 81*e7b1675dSTing-Kang Chang // The prime factor q of n. 82*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 83*e7b1675dSTing-Kang Chang util::SecretData q; 84*e7b1675dSTing-Kang Chang // d mod (p - 1). 85*e7b1675dSTing-Kang Chang util::SecretData dp; 86*e7b1675dSTing-Kang Chang // d mod (q - 1). 87*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 88*e7b1675dSTing-Kang Chang util::SecretData dq; 89*e7b1675dSTing-Kang Chang // Chinese Remainder Theorem coefficient q^(-1) mod p. 90*e7b1675dSTing-Kang Chang // Unsigned big integer in bigendian representation. 91*e7b1675dSTing-Kang Chang util::SecretData crt; 92*e7b1675dSTing-Kang Chang }; 93*e7b1675dSTing-Kang Chang 94*e7b1675dSTing-Kang Chang // Validates whether 'modulus_size' is at least 2048-bit. 95*e7b1675dSTing-Kang Chang // To reach 128-bit security strength, RSA's modulus must be at least 96*e7b1675dSTing-Kang Chang // 3072-bit while 2048-bit RSA key only has 112-bit security. Nevertheless, 97*e7b1675dSTing-Kang Chang // a 2048-bit RSA key is considered safe by NIST until 2030 (see 98*e7b1675dSTing-Kang Chang // https://www.keylength.com/en/4/). 99*e7b1675dSTing-Kang Chang crypto::tink::util::Status ValidateRsaModulusSize(size_t modulus_size); 100*e7b1675dSTing-Kang Chang 101*e7b1675dSTing-Kang Chang // Validates whether `exponent` is a valid bignum, is odd, greater than 65536 102*e7b1675dSTing-Kang Chang // and smaller than 32 bits. The primes p and q are chosen such that (p-1)(q-1) 103*e7b1675dSTing-Kang Chang // is relatively prime to the public exponent. Therefore, the public exponent 104*e7b1675dSTing-Kang Chang // must be odd. Furthermore, choosing a public exponent which is not greater 105*e7b1675dSTing-Kang Chang // than 65536 can lead to weak instantiations of RSA. A public exponent which is 106*e7b1675dSTing-Kang Chang // odd and greater than 65536 conforms to the requirements set by NIST FIPS 107*e7b1675dSTing-Kang Chang // 186-4 (Appendix B.3.1). 108*e7b1675dSTing-Kang Chang crypto::tink::util::Status ValidateRsaPublicExponent(const BIGNUM *exponent); 109*e7b1675dSTing-Kang Chang 110*e7b1675dSTing-Kang Chang // Validates whether `exponent` is a valid bignum, is odd, greater than 65536 111*e7b1675dSTing-Kang Chang // and smaller than 32 bits. 112*e7b1675dSTing-Kang Chang crypto::tink::util::Status ValidateRsaPublicExponent( 113*e7b1675dSTing-Kang Chang absl::string_view exponent); 114*e7b1675dSTing-Kang Chang 115*e7b1675dSTing-Kang Chang // Creates a new RSA key pair and populates `private_key` and `public_key`. 116*e7b1675dSTing-Kang Chang crypto::tink::util::Status NewRsaKeyPair(int modulus_size_in_bits, 117*e7b1675dSTing-Kang Chang const BIGNUM *e, 118*e7b1675dSTing-Kang Chang RsaPrivateKey *private_key, 119*e7b1675dSTing-Kang Chang RsaPublicKey *public_key); 120*e7b1675dSTing-Kang Chang 121*e7b1675dSTing-Kang Chang // Returns `key`'s private and public exponents (d and e) and mosulus 122*e7b1675dSTing-Kang Chang // (n) writing a copy of them into `rsa`. 123*e7b1675dSTing-Kang Chang crypto::tink::util::Status GetRsaModAndExponents(const RsaPrivateKey &key, 124*e7b1675dSTing-Kang Chang RSA *rsa); 125*e7b1675dSTing-Kang Chang 126*e7b1675dSTing-Kang Chang // Returns `key`'s prime factors (p and q) writing a copy of them into `rsa`. 127*e7b1675dSTing-Kang Chang crypto::tink::util::Status GetRsaPrimeFactors(const RsaPrivateKey &key, 128*e7b1675dSTing-Kang Chang RSA *rsa); 129*e7b1675dSTing-Kang Chang 130*e7b1675dSTing-Kang Chang // Returns `key`'s CRT parameters (dp and dq) writing a copy of them into `rsa`. 131*e7b1675dSTing-Kang Chang crypto::tink::util::Status GetRsaCrtParams(const RsaPrivateKey &key, RSA *rsa); 132*e7b1675dSTing-Kang Chang 133*e7b1675dSTing-Kang Chang // Creates a OpenSSL/BoringSSL RSA key from `private_key`. 134*e7b1675dSTing-Kang Chang crypto::tink::util::StatusOr<internal::SslUniquePtr<RSA>> RsaPrivateKeyToRsa( 135*e7b1675dSTing-Kang Chang const RsaPrivateKey &private_key); 136*e7b1675dSTing-Kang Chang 137*e7b1675dSTing-Kang Chang // Creates a OpenSSL/BoringSSL RSA key from an `public_key`. 138*e7b1675dSTing-Kang Chang crypto::tink::util::StatusOr<internal::SslUniquePtr<RSA>> RsaPublicKeyToRsa( 139*e7b1675dSTing-Kang Chang const RsaPublicKey &public_key); 140*e7b1675dSTing-Kang Chang 141*e7b1675dSTing-Kang Chang // Performs some basic checks on the given RSA public key `key` as in [1] when 142*e7b1675dSTing-Kang Chang // OpenSSL is used as a backend. This is needed because with OpenSSL calls to 143*e7b1675dSTing-Kang Chang // RSA_check_key with RSA keys that have only the modulus and public exponent 144*e7b1675dSTing-Kang Chang // populated don't work [2]. When BoringSSL is used, it uses BoringSSL's 145*e7b1675dSTing-Kang Chang // RSA_check_key. 146*e7b1675dSTing-Kang Chang // 147*e7b1675dSTing-Kang Chang // [1] https://github.com/google/boringssl/blob/master/crypto/fipsmodule/rsa/rsa_impl.c#L76 148*e7b1675dSTing-Kang Chang // [2] https://www.openssl.org/docs/man1.1.1/man3/RSA_check_key.html 149*e7b1675dSTing-Kang Chang crypto::tink::util::Status RsaCheckPublicKey(const RSA *key); 150*e7b1675dSTing-Kang Chang 151*e7b1675dSTing-Kang Chang } // namespace internal 152*e7b1675dSTing-Kang Chang } // namespace tink 153*e7b1675dSTing-Kang Chang } // namespace crypto 154*e7b1675dSTing-Kang Chang 155*e7b1675dSTing-Kang Chang #endif // TINK_INTERNAL_RSA_UTIL_H_ 156