// Copyright 2018 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//      http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////

package com.google.crypto.tink.signature;

import com.google.crypto.tink.KeyTemplate;
import com.google.crypto.tink.KeyTypeManager;
import com.google.crypto.tink.PrivateKeyTypeManager;
import com.google.crypto.tink.PublicKeySign;
import com.google.crypto.tink.Registry;
import com.google.crypto.tink.proto.HashType;
import com.google.crypto.tink.proto.KeyData.KeyMaterialType;
import com.google.crypto.tink.proto.RsaSsaPssKeyFormat;
import com.google.crypto.tink.proto.RsaSsaPssParams;
import com.google.crypto.tink.proto.RsaSsaPssPrivateKey;
import com.google.crypto.tink.proto.RsaSsaPssPublicKey;
import com.google.crypto.tink.subtle.EngineFactory;
import com.google.crypto.tink.subtle.RsaSsaPssSignJce;
import com.google.crypto.tink.subtle.RsaSsaPssVerifyJce;
import com.google.crypto.tink.subtle.Validators;
import com.google.protobuf.ByteString;
import com.google.protobuf.ExtensionRegistryLite;
import com.google.protobuf.InvalidProtocolBufferException;
import java.math.BigInteger;
import java.nio.charset.Charset;
import java.security.GeneralSecurityException;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.interfaces.RSAPrivateCrtKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.RSAKeyGenParameterSpec;
import java.security.spec.RSAPrivateCrtKeySpec;
import java.security.spec.RSAPublicKeySpec;

This key manager generates new RsaSsaPssPrivateKey keys and produces new instances of RsaSsaPssSignJce.
/** * This key manager generates new {@code RsaSsaPssPrivateKey} keys and produces new instances of * {@code RsaSsaPssSignJce}. */
public final class RsaSsaPssSignKeyManager extends PrivateKeyTypeManager<RsaSsaPssPrivateKey, RsaSsaPssPublicKey> { private static final byte[] TEST_MESSAGE = "Tink and Wycheproof.".getBytes(Charset.forName("UTF-8")); RsaSsaPssSignKeyManager() { super( RsaSsaPssPrivateKey.class, RsaSsaPssPublicKey.class, new KeyTypeManager.PrimitiveFactory<PublicKeySign, RsaSsaPssPrivateKey>( PublicKeySign.class) { @Override public PublicKeySign getPrimitive(RsaSsaPssPrivateKey keyProto) throws GeneralSecurityException { java.security.KeyFactory kf = EngineFactory.KEY_FACTORY.getInstance("RSA"); RSAPrivateCrtKey privateKey = (RSAPrivateCrtKey) kf.generatePrivate( new RSAPrivateCrtKeySpec( new BigInteger(1, keyProto.getPublicKey().getN().toByteArray()), new BigInteger(1, keyProto.getPublicKey().getE().toByteArray()), new BigInteger(1, keyProto.getD().toByteArray()), new BigInteger(1, keyProto.getP().toByteArray()), new BigInteger(1, keyProto.getQ().toByteArray()), new BigInteger(1, keyProto.getDp().toByteArray()), new BigInteger(1, keyProto.getDq().toByteArray()), new BigInteger(1, keyProto.getCrt().toByteArray()))); RsaSsaPssParams params = keyProto.getPublicKey().getParams(); // Sign and verify a test message to make sure that the key is correct. RsaSsaPssSignJce signer = new RsaSsaPssSignJce( privateKey, SigUtil.toHashType(params.getSigHash()), SigUtil.toHashType(params.getMgf1Hash()), params.getSaltLength()); RSAPublicKey publicKey = (RSAPublicKey) kf.generatePublic( new RSAPublicKeySpec( new BigInteger(1, keyProto.getPublicKey().getN().toByteArray()), new BigInteger(1, keyProto.getPublicKey().getE().toByteArray()))); RsaSsaPssVerifyJce verifier = new RsaSsaPssVerifyJce( publicKey, SigUtil.toHashType(params.getSigHash()), SigUtil.toHashType(params.getMgf1Hash()), params.getSaltLength()); try { verifier.verify(signer.sign(TEST_MESSAGE), TEST_MESSAGE); } catch (GeneralSecurityException e) { throw new RuntimeException( "Security bug: signing with private key followed by verifying with public key" + " failed" + e); } return signer; } }); } @Override public String getKeyType() { return "type.googleapis.com/google.crypto.tink.RsaSsaPssPrivateKey"; } @Override public int getVersion() { return 0; } @Override public RsaSsaPssPublicKey getPublicKey(RsaSsaPssPrivateKey privKeyProto) throws GeneralSecurityException { return privKeyProto.getPublicKey(); } @Override public KeyMaterialType keyMaterialType() { return KeyMaterialType.ASYMMETRIC_PRIVATE; } @Override public RsaSsaPssPrivateKey parseKey(ByteString byteString) throws InvalidProtocolBufferException { return RsaSsaPssPrivateKey.parseFrom(byteString, ExtensionRegistryLite.getEmptyRegistry()); } @Override public void validateKey(RsaSsaPssPrivateKey keyProto) throws GeneralSecurityException { Validators.validateVersion(keyProto.getVersion(), getVersion()); Validators.validateRsaModulusSize( new BigInteger(1, keyProto.getPublicKey().getN().toByteArray()).bitLength()); SigUtil.validateRsaSsaPssParams(keyProto.getPublicKey().getParams()); } @Override public KeyFactory<RsaSsaPssKeyFormat, RsaSsaPssPrivateKey> keyFactory() { return new KeyFactory<RsaSsaPssKeyFormat, RsaSsaPssPrivateKey>(RsaSsaPssKeyFormat.class) { @Override public void validateKeyFormat(RsaSsaPssKeyFormat format) throws GeneralSecurityException { SigUtil.validateRsaSsaPssParams(format.getParams()); Validators.validateRsaModulusSize(format.getModulusSizeInBits()); } @Override public RsaSsaPssKeyFormat parseKeyFormat(ByteString byteString) throws InvalidProtocolBufferException { return RsaSsaPssKeyFormat.parseFrom(byteString, ExtensionRegistryLite.getEmptyRegistry()); } @Override public RsaSsaPssPrivateKey createKey(RsaSsaPssKeyFormat format) throws GeneralSecurityException { RsaSsaPssParams params = format.getParams(); Validators.validateRsaModulusSize(format.getModulusSizeInBits()); Validators.validateSignatureHash(SigUtil.toHashType(params.getSigHash())); KeyPairGenerator keyGen = EngineFactory.KEY_PAIR_GENERATOR.getInstance("RSA"); RSAKeyGenParameterSpec spec = new RSAKeyGenParameterSpec( format.getModulusSizeInBits(), new BigInteger(1, format.getPublicExponent().toByteArray())); keyGen.initialize(spec); KeyPair keyPair = keyGen.generateKeyPair(); RSAPublicKey pubKey = (RSAPublicKey) keyPair.getPublic(); RSAPrivateCrtKey privKey = (RSAPrivateCrtKey) keyPair.getPrivate(); // Creates RsaSsaPssPublicKey. RsaSsaPssPublicKey pssPubKey = RsaSsaPssPublicKey.newBuilder() .setVersion(getVersion()) .setParams(params) .setE(ByteString.copyFrom(pubKey.getPublicExponent().toByteArray())) .setN(ByteString.copyFrom(pubKey.getModulus().toByteArray())) .build(); // Creates RsaSsaPssPrivateKey. return RsaSsaPssPrivateKey.newBuilder() .setVersion(getVersion()) .setPublicKey(pssPubKey) .setD(ByteString.copyFrom(privKey.getPrivateExponent().toByteArray())) .setP(ByteString.copyFrom(privKey.getPrimeP().toByteArray())) .setQ(ByteString.copyFrom(privKey.getPrimeQ().toByteArray())) .setDp(ByteString.copyFrom(privKey.getPrimeExponentP().toByteArray())) .setDq(ByteString.copyFrom(privKey.getPrimeExponentQ().toByteArray())) .setCrt(ByteString.copyFrom(privKey.getCrtCoefficient().toByteArray())) .build(); } }; }
Registers the RsaSsaPssSignKeyManager and the RsaSsaPssVerifyKeyManager with the registry, so that the the RsaSsaPss-Keys can be used with Tink.
/** * Registers the {@link RsaSsaPssSignKeyManager} and the {@link RsaSsaPssVerifyKeyManager} * with the registry, so that the the RsaSsaPss-Keys can be used with Tink. */
public static void registerPair(boolean newKeyAllowed) throws GeneralSecurityException { Registry.registerAsymmetricKeyManagers( new RsaSsaPssSignKeyManager(), new RsaSsaPssVerifyKeyManager(), newKeyAllowed); }
Returns:A KeyTemplate that generates new instances of RSA-SSA-PSS key pairs with the following parameters:
  • Signature hash: SHA256.
  • MGF1 hash: SHA256.
  • Salt length: 32 (i.e., SHA256's output length).
  • Modulus size: 3072 bit.
  • Public exponent: 65537 (aka F4).
  • Prefix type: OutputPrefixType.TINK.
/** * @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the * following parameters: * <ul> * <li>Signature hash: SHA256. * <li>MGF1 hash: SHA256. * <li>Salt length: 32 (i.e., SHA256's output length). * <li>Modulus size: 3072 bit. * <li>Public exponent: 65537 (aka F4). * <li>Prefix type: {@link KeyTemplate.OutputPrefixType#TINK}. * </ul> */
public static final KeyTemplate rsa3072PssSha256F4Template() { return createKeyTemplate( HashType.SHA256, HashType.SHA256, /*saltLength=*/ 32, /*modulusSize=*/ 3072, RSAKeyGenParameterSpec.F4, KeyTemplate.OutputPrefixType.TINK); }
Returns:A KeyTemplate that generates new instances of RSA-SSA-PSS key pairs with the following parameters:
  • Signature hash: SHA256.
  • MGF1 hash: SHA256.
  • Salt length: 32 (i.e., SHA256's output length).
  • Modulus size: 3072 bit.
  • Public exponent: 65537 (aka F4).
  • Prefix type: OutputPrefixType.RAW (no prefix).

Keys generated from this template create signatures compatible with OpenSSL and other libraries.

/** * @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the * following parameters: * <ul> * <li>Signature hash: SHA256. * <li>MGF1 hash: SHA256. * <li>Salt length: 32 (i.e., SHA256's output length). * <li>Modulus size: 3072 bit. * <li>Public exponent: 65537 (aka F4). * <li>Prefix type: {@link KeyTemplate.OutputPrefixType#RAW} (no prefix). * </ul> * <p>Keys generated from this template create signatures compatible with OpenSSL and other * libraries. */
public static final KeyTemplate rawRsa3072PssSha256F4Template() { return createKeyTemplate( HashType.SHA256, HashType.SHA256, /*saltLength=*/ 32, /*modulusSize=*/ 3072, RSAKeyGenParameterSpec.F4, KeyTemplate.OutputPrefixType.RAW); }
Returns:A KeyTemplate that generates new instances of RSA-SSA-PSS key pairs with the following parameters:
  • Signature hash: SHA512.
  • MGF1 hash: SHA512.
  • Salt length: 64 (i.e., SHA512's output length).
  • Modulus size: 4096 bit.
  • Public exponent: 65537 (aka F4).
  • Prefix type: OutputPrefixType.TINK.
/** * @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the * following parameters: * <ul> * <li>Signature hash: SHA512. * <li>MGF1 hash: SHA512. * <li>Salt length: 64 (i.e., SHA512's output length). * <li>Modulus size: 4096 bit. * <li>Public exponent: 65537 (aka F4). * <li>Prefix type: {@link KeyTemplate.OutputPrefixType#TINK}. * </ul> */
public static final KeyTemplate rsa4096PssSha512F4Template() { return createKeyTemplate( HashType.SHA512, HashType.SHA512, /*saltLength=*/ 64, /*modulusSize=*/ 4096, RSAKeyGenParameterSpec.F4, KeyTemplate.OutputPrefixType.TINK); }
Returns:A KeyTemplate that generates new instances of RSA-SSA-PSS key pairs with the following parameters:
  • Signature hash: SHA512.
  • MGF1 hash: SHA512.
  • Salt length: 64 (i.e., SHA512's output length).
  • Modulus size: 4096 bit.
  • Public exponent: 65537 (aka F4).
  • Prefix type: OutputPrefixType.RAW (no prefix).

Keys generated from this template create signatures compatible with OpenSSL and other libraries.

/** * @return A {@link KeyTemplate} that generates new instances of RSA-SSA-PSS key pairs with the * following parameters: * <ul> * <li>Signature hash: SHA512. * <li>MGF1 hash: SHA512. * <li>Salt length: 64 (i.e., SHA512's output length). * <li>Modulus size: 4096 bit. * <li>Public exponent: 65537 (aka F4). * <li>Prefix type: {@link KeyTemplate.OutputPrefixType#RAW} (no prefix). * </ul> * <p>Keys generated from this template create signatures compatible with OpenSSL and other * libraries. */
public static final KeyTemplate rawRsa4096PssSha512F4Template() { return createKeyTemplate( HashType.SHA512, HashType.SHA512, /*saltLength=*/ 64, /*modulusSize=*/ 4096, RSAKeyGenParameterSpec.F4, KeyTemplate.OutputPrefixType.RAW); }
Returns:a KeyTemplate containing a RsaSsaPssKeyFormat with some specified parameters.
/** * @return a {@link KeyTemplate} containing a {@link RsaSsaPssKeyFormat} with some specified * parameters. */
private static KeyTemplate createKeyTemplate( HashType sigHash, HashType mgf1Hash, int saltLength, int modulusSize, BigInteger publicExponent, KeyTemplate.OutputPrefixType prefixType) { RsaSsaPssParams params = RsaSsaPssParams.newBuilder() .setSigHash(sigHash) .setMgf1Hash(mgf1Hash) .setSaltLength(saltLength) .build(); RsaSsaPssKeyFormat format = RsaSsaPssKeyFormat.newBuilder() .setParams(params) .setModulusSizeInBits(modulusSize) .setPublicExponent(ByteString.copyFrom(publicExponent.toByteArray())) .build(); return KeyTemplate.create( new RsaSsaPssSignKeyManager().getKeyType(), format.toByteArray(), prefixType); } }