• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

randombit / botan / 22061970273

16 Feb 2026 12:03PM UTC coverage: 90.044% (+0.007%) from 90.037%
22061970273

push

github

web-flow
Merge pull request #5345 from randombit/jack/min-test-rng-h

Minimize includes into test_rng.h

102336 of 113651 relevant lines covered (90.04%)

11395171.59 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

95.83
/src/tests/test_xmss.cpp
1
/*
2
* Extended Hash-Based Signatures Tests
3
*
4
* (C) 2014,2015 Jack Lloyd
5
* (C) 2016,2018 Matthias Gierlings
6
*
7
* Botan is released under the Simplified BSD License (see license.txt)
8
**/
9

10
#include "tests.h"
11

12
#if defined(BOTAN_HAS_XMSS_RFC8391)
13
   #include "test_pubkey.h"
14
   #include "test_rng.h"
15
   #include <botan/hash.h>
16
   #include <botan/hex.h>
17
   #include <botan/pubkey.h>
18
   #include <botan/xmss.h>
19
   #include <botan/internal/buffer_slicer.h>
20
   #include <botan/internal/loadstor.h>
21
#endif
22

23
namespace Botan_Tests {
24

25
namespace {
26

27
#if defined(BOTAN_HAS_XMSS_RFC8391)
28

29
class XMSS_Signature_Tests final : public PK_Signature_Generation_Test {
30
   public:
31
      XMSS_Signature_Tests() :
1✔
32
            PK_Signature_Generation_Test("XMSS", "pubkey/xmss_sig.vec", "Params,Msg,PrivateKey,Signature") {}
2✔
33

34
      bool skip_this_test(const std::string& /*header*/, const VarMap& vars) override {
27✔
35
         if(Test::run_long_tests() == false) {
27✔
36
            const std::string params = vars.get_req_str("Params");
×
37

38
            if(params == "SHAKE_10_256" || params == "SHA2_10_192") {
×
39
               return false;
40
            }
41

42
            return true;
×
43
         }
×
44

45
         return false;
46
      }
47

48
      std::string default_padding(const VarMap& vars) const override { return vars.get_req_str("Params"); }
54✔
49

50
      std::unique_ptr<Botan::Private_Key> load_private_key(const VarMap& vars) override {
27✔
51
         const std::vector<uint8_t> raw_key = vars.get_req_bin("PrivateKey");
27✔
52
         const Botan::secure_vector<uint8_t> sec_key(raw_key.begin(), raw_key.end());
27✔
53

54
         return std::make_unique<Botan::XMSS_PrivateKey>(sec_key);
27✔
55
      }
54✔
56
};
57

58
class XMSS_Signature_Verify_Tests final : public PK_Signature_Verification_Test {
59
   public:
60
      XMSS_Signature_Verify_Tests() :
1✔
61
            PK_Signature_Verification_Test("XMSS", "pubkey/xmss_verify.vec", "Params,Msg,PublicKey,Signature") {}
2✔
62

63
      std::string default_padding(const VarMap& vars) const override { return vars.get_req_str("Params"); }
126✔
64

65
      std::unique_ptr<Botan::Public_Key> load_public_key(const VarMap& vars) override {
63✔
66
         const std::vector<uint8_t> raw_key = vars.get_req_bin("PublicKey");
63✔
67
         return std::make_unique<Botan::XMSS_PublicKey>(raw_key);
126✔
68
      }
63✔
69
};
70

71
class XMSS_Signature_Verify_Invalid_Tests final : public PK_Signature_NonVerification_Test {
72
   public:
73
      XMSS_Signature_Verify_Invalid_Tests() :
1✔
74
            PK_Signature_NonVerification_Test(
75
               "XMSS", "pubkey/xmss_invalid.vec", "Params,Msg,PublicKey,InvalidSignature") {}
2✔
76

77
      std::string default_padding(const VarMap& vars) const override { return vars.get_req_str("Params"); }
672✔
78

79
      std::unique_ptr<Botan::Public_Key> load_public_key(const VarMap& vars) override {
336✔
80
         const std::vector<uint8_t> raw_key = vars.get_req_bin("PublicKey");
336✔
81
         return std::make_unique<Botan::XMSS_PublicKey>(raw_key);
672✔
82
      }
336✔
83
};
84

85
class XMSS_Keygen_Tests final : public PK_Key_Generation_Test {
1✔
86
   public:
87
      std::vector<std::string> keygen_params() const override { return {"XMSS-SHA2_10_256", "XMSS-SHA2_10_192"}; }
1✔
88

89
      std::string algo_name() const override { return "XMSS"; }
2✔
90

91
      std::unique_ptr<Botan::Public_Key> public_key_from_raw(std::string_view /* keygen_params */,
2✔
92
                                                             std::string_view /* provider */,
93
                                                             std::span<const uint8_t> raw_pk) const override {
94
         Botan::BufferSlicer s(raw_pk);
2✔
95
         const auto oid = Botan::XMSS_Parameters::xmss_algorithm_t(Botan::load_be(s.take<4>()));
2✔
96
         const auto p = Botan::XMSS_Parameters(oid);
2✔
97
         auto root = s.copy_as_secure_vector(p.element_size());
2✔
98
         auto public_seed = s.copy_as_secure_vector(p.element_size());
2✔
99

100
         return std::make_unique<Botan::XMSS_PublicKey>(oid, std::move(root), std::move(public_seed));
4✔
101
      }
4✔
102
};
103

104
/**
105
 * Tests that the key generation is compatible with the reference implementation
106
 *   based on: https://github.com/XMSS/xmss-reference/tree/171ccbd
107
 */
108
class XMSS_Keygen_Reference_Test final : public Text_Based_Test {
×
109
   public:
110
      XMSS_Keygen_Reference_Test() :
1✔
111
            Text_Based_Test("pubkey/xmss_keygen_reference.vec",
112
                            "Params,SecretSeed,PublicSeed,SecretPrf,PublicKey,PrivateKey") {}
2✔
113

114
      Test::Result run_one_test(const std::string& /*header*/, const VarMap& vars) final {
7✔
115
         Test::Result result(vars.get_req_str("Params"));
14✔
116

117
         Fixed_Output_RNG fixed_rng;
7✔
118
         auto add_entropy = [&](auto v) { fixed_rng.add_entropy(v.data(), v.size()); };
21✔
119

120
         // The order of the RNG values is dependent on the order they are pulled
121
         // from the RNG in the production implementation.
122
         add_entropy(vars.get_req_bin("PublicSeed"));  // XMSS_PublicKey constructor's initializer list
21✔
123
         add_entropy(vars.get_req_bin("SecretPrf"));   // XMSS_PrivateKey constructor's call to ..._Internal constructor
21✔
124
         add_entropy(vars.get_req_bin("SecretSeed"));  // XMSS_PrivateKey constructor's call to ..._Internal constructor
21✔
125

126
         const auto xmss_algo = Botan::XMSS_Parameters::xmss_id_from_string(vars.get_req_str("Params"));
7✔
127
         const Botan::XMSS_PrivateKey keypair(xmss_algo, fixed_rng);
7✔
128

129
         result.test_bin_eq("Generated private key matches", keypair.raw_private_key(), vars.get_req_bin("PrivateKey"));
21✔
130
         result.test_bin_eq("Generated public key matches", keypair.raw_public_key(), vars.get_req_bin("PublicKey"));
21✔
131

132
         return result;
14✔
133
      }
14✔
134

135
      bool skip_this_test(const std::string& /*header*/, const VarMap& vars) override {
7✔
136
         const std::string param_str = vars.get_req_str("Params");
7✔
137
         const auto params = Botan::XMSS_Parameters(param_str);
7✔
138
         const bool hash_available = Botan::HashFunction::create(params.hash_function_name()) != nullptr;
7✔
139
         const bool fast_params = param_str == "XMSS-SHA2_10_256";
7✔
140
         return !(hash_available && (fast_params || Test::run_long_tests()));
7✔
141
      }
7✔
142
};
143

144
std::vector<Test::Result> xmss_statefulness() {
1✔
145
   auto rng = Test::new_rng(__func__);
1✔
146

147
   auto sign_something = [&rng](auto& sk) {
3✔
148
      auto msg = Botan::hex_decode("deadbeef");
3✔
149

150
      Botan::PK_Signer signer(sk, *rng, "SHA2_10_256");
4✔
151
      signer.sign_message(msg, *rng);
5✔
152
   };
5✔
153

154
   return {CHECK("signing alters state",
1✔
155
                 [&](auto& result) {
1✔
156
                    Botan::XMSS_PrivateKey sk(Botan::XMSS_Parameters::XMSS_SHA2_10_256, *rng);
1✔
157
                    result.require("allows 1024 signatures", sk.remaining_operations() == 1024);
2✔
158

159
                    sign_something(sk);
1✔
160

161
                    result.require("allows 1023 signatures", sk.remaining_operations() == 1023);
2✔
162
                 }),
1✔
163

164
           CHECK("state can become exhausted", [&](auto& result) {
1✔
165
              const auto skbytes = Botan::hex_decode(
1✔
166
                 "000000011BBB81273E8057724A2A894593A1A688B3271410B3BEAB9F5587337BCDCBBF5C4E43AB"
167
                 "0AB2F88258E5AC54BB252E39335AE9B0D4AF0C0347EA45B8AA0AA3804C000003FFAC0C29C1ACD3"
168
                 //                                                         ~~1023~~
169
                 "19DA96E9C8EE4E28C2078441A76B6BB8BAFD358F67FBCBFC559B55C37C01FFADBB118099759EEB"
170
                 "A3B07643F73BCB4AAC546E244B57782D6BEABC");
171
              Botan::XMSS_PrivateKey sk(skbytes);
1✔
172
              result.require("allow one last signature", sk.remaining_operations() == 1);
2✔
173

174
              sign_something(sk);
1✔
175

176
              result.require("allow no more signatures", sk.remaining_operations() == 0);
2✔
177
              result.test_throws("no more signing", [&] { sign_something(sk); });
2✔
178
           })};
5✔
179
}
2✔
180

181
std::vector<Test::Result> xmss_legacy_private_key() {
1✔
182
   const auto legacy_xmss_public_key = Botan::hex_decode(
1✔
183
      "00000001C49B128365E23D97C2D36A2AC26E0B448FCEF77A5ED68EFDC460E787D0EDB67"
184
      "68EAC3E82B04B84571C49684ED822F8179FDFF1C825DA9F9EA78F5D50A21E6341");
1✔
185

186
   // With Botan 3.0 we implemented a multi-target attack mitigation as
187
   // suggested by NIST's SP.800-208. This private key was generated before that.
188
   const auto legacy_xmss_private_key = Botan::hex_decode(
1✔
189
      "04818800000001C49B128365E23D97C2D36A2AC26E0B448FCEF77A5ED68EFDC460E787D"
190
      "0EDB6768EAC3E82B04B84571C49684ED822F8179FDFF1C825DA9F9EA78F5D50A21E6341"
191
      "0000000059FF2307F3D05577B1B259A64B5D8DB8FDF51A4EA898D23B3F4F574961ED7A6"
192
      "A7F42ADD11F527ED757E79183A2FABA0E37E1C3C8C6E6468B4AB44305D3920DAE");
1✔
193

194
   const auto legacy_signature = Botan::hex_decode(
1✔
195
      "0000000049BB2EDE36E46FD63C5DBA3F60A2F628E3116452DAB39A60A4E321110EC45D1"
196
      "CE7CD3F33F736B8ACABB9D2FA0764645F1FD708E84B82BED1D94B2FD4A4AF72DE4B68AE"
197
      "2B7E95A99B752C6CD74DF3180754A2B663F164616B07E0212224CA3A66887DDA3083090"
198
      "010310D9F16BB087DE1F346FD2C2693AC5DE11DE24181A21AF3F2CFF6535C11D2072078"
199
      "D291E939BC95C8F3CD4A59225774EB291B8CDE7A90AF03030BF05F71FCD2BD0C4462E6B"
200
      "9FAC751B5E896370966357B3032A2650895502566FFCD99C309548C5091785DC145A511"
201
      "E591F39495EF86B1CFBBA654BB289A3B61BCB4C5967773182396D384E76D6007FD9698C"
202
      "55F8F4DA4A21EA97FBDF7B40B4289917B51067307BAC0507DBB39E4B618B799AAD8D08D"
203
      "FB4C10B648AFC66BFB071472FC6ADEC311008FF1D4C4F32BE664DCEF829375E3A92A0F0"
204
      "C9D7C4613B778172ACF81F7EFEE1D76A4AF0C1195292BE694F655374B68C3DB9E4C82F2"
205
      "8FF2EEC3AE9B5D1EDC807608E1A08246408CECBE5816BCC6585A9558A8EAE57619EAEE3"
206
      "1DE879138FAE3EACBFF180F71ED4BD28497BDCDE4CF37D40FDDE92D3422A1DA99CEEDC4"
207
      "063656E81E3F9398E9333BB3BCE7A0FC594D12F9A9E82D3FE89E66C49F07144737D56B1"
208
      "B0DCE1B98AC3B3619C4D85C77416C286998652A0A08A9F0D5B51BBD4040C0A07373130C"
209
      "1E9C0194F649018D67AF050353BE08E3E5E750D7E9D85C9C7283F5293212C8D372BBFDA"
210
      "8D28A581B42C90BE0C5E68FC63A3E0812656EB0D57CE9758ADD8436F57B9FD402EE42E9"
211
      "25CA68A52BEEE972871C9559819C9BAED8FD3BA508DCC9945415B603330A82CAEAA8001"
212
      "9EB1332E191E06EC8FA325BCE49B903BFC4244608A42E673D3DFA8202F49AE5C150AB56"
213
      "D4C720E32719498835D35D7062FCF2A969F552B11672CB7061E7C565B960C2BA8EB0780"
214
      "49365202674D07617DD516D2C598C71669D43EE63852BC758ABFD042097FEC7E3F9B855"
215
      "9AF3043630F00AEB9DF8B549076FBB2F786D0BD16C889439F45D441AF3EBC16E70AF7B5"
216
      "98D36A9F3A5FA05D5D438D1A563C9AC11B73A6A9976AD3DC78190F3289F35D019D5DF59"
217
      "DD3262608643509C25FF4C6056C7528BB551680F6A5E637F60C5951593F7E701C297DA0"
218
      "FDB289D1D47E2CE1F5E3CD6703069F773860152C903962B0F8704E6B89201296C05D6DA"
219
      "81CC0E3848E8C07400A9B3962013642E25F2332FC820463890D97F3BD34DDC4318E2EA1"
220
      "E65BE4F5613854856497BE2C4B894731DCD45209038C80855EB4150EE5D4CC6BE6859A6"
221
      "D71A02AD693E2F43BD5736859B7F295BA068503510347637ABF19D67F984BAA9AFE577B"
222
      "BC4EFF50FD7F2F56305DF9F0393DDB02F20BA554DFF9ACF6748E8FFE433267CCBE0C434"
223
      "900672987D00197116F61FACE800C42FAA1957D95679F4CDCA392E5CAC26E84F523D23D"
224
      "C209C19E8E42FAF1269A6C07BDC3E89304E479D2F71A7BCDDBF485BA65662013DD4F35C"
225
      "1CB7CBB7FD9388DD048AA5CB5AF01A7DB63E20BCB43B2C7AB2CBC9C9232CE5099055915"
226
      "6D18B0BD44B46C813CC2E0C29361790B3EE61EF6946AE3197A8B0226B47E8931A9841DA"
227
      "6A976EB1A105F0487AFD294BE69B4021BF60EFDA826DC69C1A2BAE015CD0D13DD614E8A"
228
      "71B885FFB9CDBF8BCF157BAF08D1A4EE24573235617F70049511AFF40D9243D2398C8F0"
229
      "05790D86F0956473BDBC5DEF4DFB12597F6BE67E3265E062356D4122D30B3BCDC60D736"
230
      "0D82FB0943DF88DC761018C7E43F7653A899D517709DE33AB2866BD44748A32E96BDCA2"
231
      "84763EEEEFAEF347FD8D31AE7BF98C21498240C5BBACD9F16A7B4C8B98C9AB1F9F10E17"
232
      "8F45483CBB6DFE3CF47EEB87CB5A563105DC2AA6B3174B407A3C20FDF82B4E7A825FD4E"
233
      "80FCD3A63A9FDA6182A69A1289A0A8EECB5AC381BC53048ECBFCAF26E4BA46179081325"
234
      "DBD89ACF9EF115667368F6604E2856AD107B5CA6BFA8E9253146D9CFB32E4359A2E7A3D"
235
      "3F6DCDA5EDCD09558B904D13D3CFA5E02D409EC6C610FBF9D0E1F34C9D5AF4F18F43527"
236
      "AA0A2BB687A12AE426E3A73BD75493DCCAAABEA83E1DB0BF9CC7589EE169A8A8C5FAAA7"
237
      "7D69405D9347D9642202E50B27229AE0A8E7482F06AC4FB9F039CECE7F056EC01F83549"
238
      "6977D845641254ACF420B6766F8CD1CE13DD9041B2BE7369EFE20FC5359DFD31166FBFF"
239
      "5D1C6EBB1FFB0A6C29CC64DE9F30EE3C643A3168403911B7DDA3E7B23090C444960FCE5"
240
      "6F9F1077D0D54658DAD1C65D388448982ACE87D426595CD38F50BF88755036551976A00"
241
      "310E66E0CB8BCBF5A51AE0F6418079F29C5F56DA9F7FD787B821C6346205C520794079F"
242
      "11858E7530CF494377F998E33323030D82A44D84F5209CC608F38C950D88B6A169D297F"
243
      "101A0D3E7DA3152F7D698ED3F6F6EE79B4F87E6032B98907E2FEC3AD1F44FA7816B568A"
244
      "31AF329B19636788498BE3C21A5676BDEB987F1BA213C8E86F5D39CEC9571EB5198645C"
245
      "D39EA26BE5598D47F3324F3D763D4E892A13C579F964B72369B40800B30088DE6140E94"
246
      "5B5F03C67015EC4E03065EC9126C2417F827EC526C852020D73BB6F97DED24081399D7B"
247
      "F7EE644B16A7BC601F32A312CFB98FF0E954DF0FCD2C61154B3D8CCC32DCFCCB172033D"
248
      "5F5ACB03369E323429123FB9EAB658CB072EA9CD058CAD76D78A6F0BA01BB5D36172DE7"
249
      "4DE17704A055509B3BDBE7032F4A0E3E7329CC646D06DE7C7ECF5EF030362CE079D3C3B"
250
      "DDB605A04918C16FE79251B7705DAC88A0C84E7C692E1AFF59968DE28CBDF001BBEA509"
251
      "A8A270B6BFD7E653B2228418E73F40A14F491FAEBAC8C11F346FB51C8E10DB63ED5C287"
252
      "DA7DDC692B8FE6998AC85EA29D4F9B5FEB3E062FFEEA23DAD536DDE783AFE43606D9685"
253
      "09F4695E55FE935DF20B8E9EFEE01DD21E733C22830A6E6086EBB4AC7CFB5DC5C6F9FBE"
254
      "F131BF636A129723E5D663FDCCF181AB996D158146602D567B48CEF809E4D3E5B7A7B64"
255
      "3C48EFCA7621534397B623AF23AE6F2BE7F2D7A6FBB2D7B64B96526B73DBA66A29F4260"
256
      "2BD9FF72A165431C15A570A5731D9426210F946FC682F181944F40DFB68314ACA43E321"
257
      "4AFDF11EA825B79425F0C864E354CA7E6C447AE9E0796AAB2B6720516D3FC0B73CFE98E"
258
      "F0D8E8D80A59DB9ADA0F03CF0444E1BED9ED9A75FBB6FD6D5BAD4F5FF66C8987ADA6F9F"
259
      "CA06CBAD1C9E329B844CC5BBF6CCC52852DE44B72EECAF34802043107542F5BFEA73944"
260
      "611AB035D6D7A8EBD3101F321A54C1DADC600419F8DA6BF3967E5B9E708BC4C3E901623"
261
      "E8FB6E87825757498A24A921EC601CC15399237D9C4115B678E8968A2095818D9261C4E"
262
      "8F94B9DCE3F74EC7E0479F6F6AB13676954390EF3B45D2292BF664D618CFE5ECFFBD391"
263
      "872B4F9F306A09B1238E7561942C7065FD14208F4D4A42752A9A747A29B8BE3C1658EDC"
264
      "6B250DBD1599FBB09A7F148A7AEFEAB26ADB728A330DD3F616C8A736D1BF4EA17F2C3BF"
265
      "A5E22C249FA9D1E7DA08DB351709C4");
1✔
266

267
   Botan::XMSS_PrivateKey legacy_secret_key = Botan::XMSS_PrivateKey(legacy_xmss_private_key);
1✔
268
   auto public_key_from_secret_key = legacy_secret_key.public_key();
1✔
269
   Botan::XMSS_PublicKey legacy_public_key = Botan::XMSS_PublicKey(legacy_xmss_public_key);
1✔
270

271
   const auto message = Botan::hex_decode("deadcafe");
1✔
272
   const auto* const algo_name = "SHA2_10_256";
1✔
273

274
   auto rng = Test::new_rng(__func__);
1✔
275

276
   return {
1✔
277
      CHECK("Use a legacy private key to create a signature",
278
            [&](auto& result) {
1✔
279
               Botan::PK_Signer signer(legacy_secret_key, *rng, algo_name);
1✔
280
               auto signature = signer.sign_message(message, *rng);
2✔
281

282
               Botan::PK_Verifier verifier(*public_key_from_secret_key, algo_name);
1✔
283
               result.test_is_true("legacy private key generates signatures that are still verifiable",
2✔
284
                                   verifier.verify_message(message, signature));
1✔
285
            }),
2✔
286

287
      CHECK("Verify a legacy signature",
288
            [&](auto& result) {
1✔
289
               Botan::PK_Verifier verifier(*public_key_from_secret_key, algo_name);
1✔
290
               result.test_is_true("legacy private key generates signatures that are still verifiable",
2✔
291
                                   verifier.verify_message(message, legacy_signature));
1✔
292
            }),
1✔
293

294
      CHECK("Verify a new signature by a legacy private key with a legacy public key",
295
            [&](auto& result) {
1✔
296
               Botan::PK_Signer signer(legacy_secret_key, *rng, algo_name);
1✔
297
               auto signature = signer.sign_message(message, *rng);
2✔
298

299
               Botan::PK_Verifier verifier(legacy_public_key, algo_name);
1✔
300
               result.test_is_true("legacy private key generates signatures that are still verifiable",
2✔
301
                                   verifier.verify_message(message, legacy_signature));
1✔
302
            }),
2✔
303
   };
4✔
304
}
7✔
305

306
BOTAN_REGISTER_TEST("pubkey", "xmss_sign", XMSS_Signature_Tests);
307
BOTAN_REGISTER_TEST("pubkey", "xmss_verify", XMSS_Signature_Verify_Tests);
308
BOTAN_REGISTER_TEST("pubkey", "xmss_verify_invalid", XMSS_Signature_Verify_Invalid_Tests);
309
BOTAN_REGISTER_TEST("pubkey", "xmss_keygen", XMSS_Keygen_Tests);
310
BOTAN_REGISTER_TEST("pubkey", "xmss_keygen_reference", XMSS_Keygen_Reference_Test);
311
BOTAN_REGISTER_TEST_FN("pubkey", "xmss_unit_tests", xmss_statefulness, xmss_legacy_private_key);
312

313
#endif
314

315
}  // namespace
316

317
}  // namespace Botan_Tests
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc