blob: 0ec4fc1a4ca2fd0f8c6158c8afb912ab3d4a7f03 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
|
// Copyright 2018 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
///////////////////////////////////////////////////////////////////////////////
#ifndef TINK_SUBTLE_RSA_SSA_PKCS1_VERIFY_BORINGSSL_H_
#define TINK_SUBTLE_RSA_SSA_PKCS1_VERIFY_BORINGSSL_H_
#include <memory>
#include <utility>
#include "absl/strings/string_view.h"
#include "openssl/evp.h"
#include "openssl/rsa.h"
#include "tink/internal/fips_utils.h"
#include "tink/internal/rsa_util.h"
#include "tink/internal/ssl_unique_ptr.h"
#include "tink/public_key_verify.h"
#include "tink/subtle/common_enums.h"
#include "tink/util/status.h"
namespace crypto {
namespace tink {
namespace subtle {
// RSA SSA (Signature Schemes with Appendix) using PKCS1 (Public-Key
// Cryptography Standards) encoding is defined at
// https://tools.ietf.org/html/rfc8017#section-8.2). This implemention uses
// BoringSSL for the underlying cryptographic operations.
class RsaSsaPkcs1VerifyBoringSsl : public PublicKeyVerify {
public:
static crypto::tink::util::StatusOr<
std::unique_ptr<RsaSsaPkcs1VerifyBoringSsl>>
New(const internal::RsaPublicKey& pub_key,
const internal::RsaSsaPkcs1Params& params);
// Verifies that 'signature' is a digital signature for 'data'.
crypto::tink::util::Status Verify(absl::string_view signature,
absl::string_view data) const override;
~RsaSsaPkcs1VerifyBoringSsl() override = default;
static constexpr crypto::tink::internal::FipsCompatibility kFipsStatus =
crypto::tink::internal::FipsCompatibility::kRequiresBoringCrypto;
private:
// To reach 128-bit security strength, RSA's modulus must be at least 3072-bit
// while 2048-bit RSA key only has 112-bit security. Nevertheless, a 2048-bit
// RSA key is considered safe by NIST until 2030 (see
// https://www.keylength.com/en/4/).
static constexpr size_t kMinModulusSizeInBits = 2048;
RsaSsaPkcs1VerifyBoringSsl(internal::SslUniquePtr<RSA> rsa,
const EVP_MD* sig_hash)
: rsa_(std::move(rsa)), sig_hash_(sig_hash) {}
const internal::SslUniquePtr<RSA> rsa_;
const EVP_MD* const sig_hash_; // Owned by BoringSSL.
};
} // namespace subtle
} // namespace tink
} // namespace crypto
#endif // TINK_SUBTLE_RSA_SSA_PKCS1_VERIFY_BORINGSSL_H_
|