• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

randombit / botan / 22174537417

19 Feb 2026 08:40AM UTC coverage: 90.338% (+0.003%) from 90.335%
22174537417

Pull #5317

github

web-flow
Merge e3285b7a8 into 59d4d64fb
Pull Request #5317: add ML-DSA certificate tests with certificates from RFC 9881

102707 of 113692 relevant lines covered (90.34%)

11512406.64 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

96.69
/src/tests/test_dilithium.cpp
1
/*
2
 * Tests for Crystals Dilithium
3
 * - KAT tests using the KAT vectors from
4
 *   https://csrc.nist.gov/CSRC/media/Projects/post-quantum-cryptography/documents/round-3/submissions/Dilithium-Round3.zip
5
 *
6
 * (C) 2022,2023 Jack Lloyd
7
 * (C) 2022 Manuel Glaser, Michael Boric, René Meusel - Rohde & Schwarz Cybersecurity
8
 *
9
 * Botan is released under the Simplified BSD License (see license.txt)
10
 */
11

12
#include "botan/pkix_enums.h"
13
#include "test_rng.h"
14
#include "tests.h"
15

16
#if defined(BOTAN_HAS_DILITHIUM_COMMON)
17
   #include <botan/dilithium.h>
18
   #include <botan/hash.h>
19
   #include <botan/pk_algs.h>
20
   #include <botan/pubkey.h>
21
   #include <botan/x509cert.h>
22

23
   #include "test_pubkey.h"
24
#endif
25

26
namespace Botan_Tests {
27

28
#if defined(BOTAN_HAS_DILITHIUM_COMMON) && defined(BOTAN_HAS_AES) && defined(BOTAN_HAS_SHA3)
29

30
template <typename DerivedT>
31
class Dilithium_KAT_Tests : public Text_Based_Test {
×
32
   public:
33
      // NOLINTNEXTLINE(*crtp-constructor-accessibility)
34
      Dilithium_KAT_Tests() : Text_Based_Test(DerivedT::test_vector, "Seed,Msg,HashPk,HashSk,HashSig", "Sig") {}
36✔
35

36
      Test::Result run_one_test(const std::string& name, const VarMap& vars) override {
1,350✔
37
         Test::Result result(name);
1,350✔
38

39
         // read input from test file
40
         const auto ref_seed = vars.get_req_bin("Seed");
1,350✔
41
         const auto ref_msg = vars.get_req_bin("Msg");
1,350✔
42
         const auto ref_pk_hash = vars.get_req_bin("HashPk");
1,350✔
43
         const auto ref_sk_hash = vars.get_req_bin("HashSk");
1,350✔
44
         const auto ref_sig_hash = vars.get_req_bin("HashSig");
1,350✔
45
         const auto ref_sig = vars.get_opt_bin("Sig");
1,350✔
46

47
         auto sha3_256 = Botan::HashFunction::create_or_throw("SHA-3(256)");
1,350✔
48

49
         auto dilithium_test_rng = std::make_unique<CTR_DRBG_AES256>(ref_seed);
1,350✔
50

51
         const Botan::Dilithium_PrivateKey priv_key(*dilithium_test_rng, DerivedT::mode);
1,350✔
52

53
         result.test_bin_eq(
4,050✔
54
            "generated expected private key hash", sha3_256->process(priv_key.private_key_bits()), ref_sk_hash);
1,350✔
55

56
         result.test_bin_eq(
2,700✔
57
            "generated expected public key hash", sha3_256->process(priv_key.public_key_bits()), ref_pk_hash);
1,350✔
58

59
         auto signer = Botan::PK_Signer(priv_key, *dilithium_test_rng, DerivedT::sign_param);
1,350✔
60
         auto signature = signer.sign_message(ref_msg.data(), ref_msg.size(), *dilithium_test_rng);
2,700✔
61

62
         result.test_bin_eq("generated expected signature hash", sha3_256->process(signature), ref_sig_hash);
2,700✔
63
         if(!ref_sig.empty()) {
1,350✔
64
            result.test_bin_eq("generated expected signature", signature, ref_sig);
12✔
65
         }
66

67
         const Botan::Dilithium_PublicKey pub_key(priv_key.public_key_bits(), DerivedT::mode);
1,350✔
68
         auto verifier = Botan::PK_Verifier(pub_key, "");
1,350✔
69
         verifier.update(ref_msg.data(), ref_msg.size());
1,350✔
70
         result.test_is_true("signature verifies", verifier.check_signature(signature.data(), signature.size()));
1,350✔
71

72
         // test validating incorrect wrong signature
73
         auto mutated_signature = Test::mutate_vec(signature, this->rng());
1,350✔
74
         result.test_is_true("invalid signature rejected",
1,350✔
75
                             !verifier.check_signature(mutated_signature.data(), mutated_signature.size()));
1,350✔
76

77
         verifier.update(ref_msg.data(), ref_msg.size());
1,350✔
78
         result.test_is_true("signature verifies", verifier.check_signature(signature.data(), signature.size()));
1,350✔
79

80
         return result;
1,350✔
81
      }
4,050✔
82
};
83

84
   // NOLINTNEXTLINE(*-macro-usage)
85
   #define REGISTER_DILITHIUM_KAT_TEST(m, rand)                                          \
86
      class DILITHIUM##m##rand final : public Dilithium_KAT_Tests<DILITHIUM##m##rand> {  \
87
         public:                                                                         \
88
            constexpr static auto test_vector = "pubkey/dilithium_" #m "_" #rand ".vec"; \
89
            constexpr static auto mode = Botan::DilithiumMode::Dilithium##m;             \
90
            constexpr static auto sign_param = #rand;                                    \
91
      };                                                                                 \
92
      BOTAN_REGISTER_TEST("pubkey", "dilithium_kat_" #m "_" #rand, DILITHIUM##m##rand)
93

94
   // NOLINTNEXTLINE(*-macro-usage)
95
   #define REGISTER_ML_DSA_KAT_TEST(m, rand)                                          \
96
      class ML_DSA##m##rand final : public Dilithium_KAT_Tests<ML_DSA##m##rand> {     \
97
         public:                                                                      \
98
            constexpr static auto test_vector = "pubkey/ml-dsa-" #m "_" #rand ".vec"; \
99
            constexpr static auto mode = Botan::DilithiumMode::ML_DSA_##m;            \
100
            constexpr static auto sign_param = #rand;                                 \
101
      };                                                                              \
102
      BOTAN_REGISTER_TEST("pubkey", "ml-dsa_kat_" #m "_" #rand, ML_DSA##m##rand)
103

104
   #if defined(BOTAN_HAS_DILITHIUM)
105
REGISTER_DILITHIUM_KAT_TEST(4x4, Deterministic);
1✔
106
REGISTER_DILITHIUM_KAT_TEST(6x5, Deterministic);
1✔
107
REGISTER_DILITHIUM_KAT_TEST(8x7, Deterministic);
1✔
108
REGISTER_DILITHIUM_KAT_TEST(4x4, Randomized);
1✔
109
REGISTER_DILITHIUM_KAT_TEST(6x5, Randomized);
1✔
110
REGISTER_DILITHIUM_KAT_TEST(8x7, Randomized);
1✔
111
   #endif
112

113
   #if defined(BOTAN_HAS_DILITHIUM_AES)
114
REGISTER_DILITHIUM_KAT_TEST(4x4_AES, Deterministic);
1✔
115
REGISTER_DILITHIUM_KAT_TEST(6x5_AES, Deterministic);
1✔
116
REGISTER_DILITHIUM_KAT_TEST(8x7_AES, Deterministic);
1✔
117
REGISTER_DILITHIUM_KAT_TEST(4x4_AES, Randomized);
1✔
118
REGISTER_DILITHIUM_KAT_TEST(6x5_AES, Randomized);
1✔
119
REGISTER_DILITHIUM_KAT_TEST(8x7_AES, Randomized);
1✔
120
   #endif
121

122
   #if defined(BOTAN_HAS_ML_DSA)
123
REGISTER_ML_DSA_KAT_TEST(4x4, Deterministic);
1✔
124
REGISTER_ML_DSA_KAT_TEST(6x5, Deterministic);
1✔
125
REGISTER_ML_DSA_KAT_TEST(8x7, Deterministic);
1✔
126
REGISTER_ML_DSA_KAT_TEST(4x4, Randomized);
1✔
127
REGISTER_ML_DSA_KAT_TEST(6x5, Randomized);
1✔
128
REGISTER_ML_DSA_KAT_TEST(8x7, Randomized);
1✔
129
   #endif
130

131
class DilithiumRoundtripTests final : public Test {
1✔
132
   public:
133
      static Test::Result run_roundtrip(
18✔
134
         const char* test_name, Botan::DilithiumMode mode, bool randomized, size_t strength, size_t psid) {
135
         Test::Result result(test_name);
18✔
136
         if(!mode.is_available()) {
18✔
137
            result.note_missing(mode.to_string());
×
138
            return result;
×
139
         }
140

141
         auto rng = Test::new_rng(test_name);
18✔
142

143
         auto sign = [randomized, &rng](const auto& private_key, const auto& msg) {
72✔
144
            const std::string param = (randomized) ? "Randomized" : "Deterministic";
81✔
145
            auto signer = Botan::PK_Signer(private_key, *rng, param);
54✔
146
            return signer.sign_message(msg, *rng);
54✔
147
         };
72✔
148

149
         auto verify = [](const auto& public_key, const auto& msg, const auto& signature) {
288✔
150
            auto verifier = Botan::PK_Verifier(public_key, "");
270✔
151
            verifier.update(msg);
270✔
152
            return verifier.check_signature(signature);
540✔
153
         };
270✔
154

155
         const std::string msg = "The quick brown fox jumps over the lazy dog.";
18✔
156
         const std::vector<uint8_t> msgvec(msg.data(), msg.data() + msg.size());
18✔
157

158
         const Botan::Dilithium_PrivateKey priv_key(*rng, mode);
18✔
159
         const Botan::Dilithium_PublicKey& pub_key = priv_key;
18✔
160

161
         result.test_sz_eq("key strength", priv_key.estimated_strength(), strength);
18✔
162
         result.test_sz_eq("key length", priv_key.key_length(), psid);
18✔
163
         result.test_sz_eq("key strength", pub_key.estimated_strength(), strength);
18✔
164
         result.test_sz_eq("key length", pub_key.key_length(), psid);
18✔
165

166
         const auto sig_before_codec = sign(priv_key, msgvec);
18✔
167

168
         const auto priv_key_encoded = priv_key.private_key_bits();
18✔
169
         const auto pub_key_encoded = priv_key.public_key_bits();
18✔
170

171
         const Botan::Dilithium_PrivateKey priv_key_decoded(priv_key_encoded, mode);
18✔
172
         const Botan::Dilithium_PublicKey pub_key_decoded(pub_key_encoded, mode);
18✔
173

174
         const auto sig_after_codec = sign(priv_key_decoded, msgvec);
18✔
175

176
         result.test_is_true("Pubkey: before,   Sig: before", verify(pub_key, msgvec, sig_before_codec));
18✔
177
         result.test_is_true("Pubkey: before,   Sig: after", verify(pub_key, msgvec, sig_after_codec));
18✔
178
         result.test_is_true("Pubkey: after,    Sig: after", verify(pub_key_decoded, msgvec, sig_after_codec));
18✔
179
         result.test_is_true("Pubkey: after,    Sig: before", verify(pub_key_decoded, msgvec, sig_before_codec));
18✔
180
         result.test_is_true("Pubkey: recalc'ed Sig: before", verify(priv_key_decoded, msgvec, sig_before_codec));
18✔
181
         result.test_is_true("Pubkey: recalc'ed Sig: after", verify(priv_key_decoded, msgvec, sig_after_codec));
18✔
182

183
         auto tampered_msgvec = msgvec;
18✔
184
         tampered_msgvec.front() = 'X';
18✔
185
         result.test_is_true("Pubkey: before,   Broken Sig: before",
54✔
186
                             !verify(pub_key, tampered_msgvec, sig_before_codec));
18✔
187
         result.test_is_true("Pubkey: before,   Broken Sig: after", !verify(pub_key, tampered_msgvec, sig_after_codec));
18✔
188
         result.test_is_true("Pubkey: after,    Broken Sig: after",
54✔
189
                             !verify(pub_key_decoded, tampered_msgvec, sig_after_codec));
18✔
190
         result.test_is_true("Pubkey: after,    Broken Sig: before",
54✔
191
                             !verify(pub_key_decoded, tampered_msgvec, sig_before_codec));
18✔
192
         result.test_is_true("Pubkey: recalc'ed Sig: before",
54✔
193
                             !verify(priv_key_decoded, tampered_msgvec, sig_before_codec));
18✔
194
         result.test_is_true("Pubkey: recalc'ed Sig: after",
54✔
195
                             !verify(priv_key_decoded, tampered_msgvec, sig_after_codec));
18✔
196

197
         // decoding via generic pk_algs.h
198
         const auto generic_pubkey_decoded = Botan::load_public_key(pub_key.algorithm_identifier(), pub_key_encoded);
18✔
199
         const auto generic_privkey_decoded =
18✔
200
            Botan::load_private_key(priv_key.algorithm_identifier(), priv_key_encoded);
18✔
201

202
         result.test_not_null("generic pubkey", generic_pubkey_decoded);
18✔
203
         result.test_not_null("generic privkey", generic_privkey_decoded);
18✔
204

205
         const auto sig_after_generic_codec = sign(*generic_privkey_decoded, msgvec);
18✔
206

207
         result.test_is_true("verification with generic public key",
18✔
208
                             verify(*generic_pubkey_decoded, msgvec, sig_before_codec));
18✔
209
         result.test_is_true("verification of signature with generic private key",
18✔
210
                             verify(*generic_pubkey_decoded, msgvec, sig_after_generic_codec));
18✔
211
         result.test_is_true("verification with generic private key",
18✔
212
                             verify(*generic_privkey_decoded, msgvec, sig_before_codec));
18✔
213

214
         return result;
18✔
215
      }
90✔
216

217
      std::vector<Test::Result> run() override {
1✔
218
         return {
1✔
219
            run_roundtrip("Dilithium_4x4_Common", Botan::DilithiumMode::Dilithium4x4, false, 128, 44),
220
            run_roundtrip("Dilithium_6x5_Common", Botan::DilithiumMode::Dilithium6x5, false, 192, 65),
221
            run_roundtrip("Dilithium_8x7_Common", Botan::DilithiumMode::Dilithium8x7, false, 256, 87),
222
            run_roundtrip("Dilithium_4x4_Common_Randomized", Botan::DilithiumMode::Dilithium4x4, true, 128, 44),
223
            run_roundtrip("Dilithium_6x5_Common_Randomized", Botan::DilithiumMode::Dilithium6x5, true, 192, 65),
224
            run_roundtrip("Dilithium_8x7_Common_Randomized", Botan::DilithiumMode::Dilithium8x7, true, 256, 87),
225
            run_roundtrip("Dilithium_4x4_AES", Botan::DilithiumMode::Dilithium4x4_AES, false, 128, 44),
226
            run_roundtrip("Dilithium_6x5_AES", Botan::DilithiumMode::Dilithium6x5_AES, false, 192, 65),
227
            run_roundtrip("Dilithium_8x7_AES", Botan::DilithiumMode::Dilithium8x7_AES, false, 256, 87),
228
            run_roundtrip("Dilithium_4x4_AES_Randomized", Botan::DilithiumMode::Dilithium4x4_AES, true, 128, 44),
229
            run_roundtrip("Dilithium_6x5_AES_Randomized", Botan::DilithiumMode::Dilithium6x5_AES, true, 192, 65),
230
            run_roundtrip("Dilithium_8x7_AES_Randomized", Botan::DilithiumMode::Dilithium8x7_AES, true, 256, 87),
231
            run_roundtrip("ML-DSA_4x4", Botan::DilithiumMode::ML_DSA_4x4, false, 128, 44),
232
            run_roundtrip("ML-DSA_6x5", Botan::DilithiumMode::ML_DSA_6x5, false, 192, 65),
233
            run_roundtrip("ML-DSA_8x7", Botan::DilithiumMode::ML_DSA_8x7, false, 256, 87),
234
            run_roundtrip("ML-DSA_4x4_Randomized", Botan::DilithiumMode::ML_DSA_4x4, true, 128, 44),
235
            run_roundtrip("ML-DSA_6x5_Randomized", Botan::DilithiumMode::ML_DSA_6x5, true, 192, 65),
236
            run_roundtrip("ML-DSA_8x7_Randomized", Botan::DilithiumMode::ML_DSA_8x7, true, 256, 87),
237
         };
19✔
238
      }
2✔
239
};
240

241
BOTAN_REGISTER_TEST("pubkey", "dilithium_roundtrips", DilithiumRoundtripTests);
242

243
class Dilithium_Keygen_Tests final : public PK_Key_Generation_Test {
1✔
244
   public:
245
      std::vector<std::string> keygen_params() const override {
1✔
246
         const std::vector<std::string> all_instances = {
1✔
247
            "Dilithium-4x4-AES-r3",
248
            "Dilithium-6x5-AES-r3",
249
            "Dilithium-8x7-AES-r3",
250
            "Dilithium-4x4-r3",
251
            "Dilithium-6x5-r3",
252
            "Dilithium-8x7-r3",
253
            "ML-DSA-4x4",
254
            "ML-DSA-6x5",
255
            "ML-DSA-8x7",
256
         };
1✔
257

258
         std::vector<std::string> available_instances;
1✔
259

260
         for(const auto& mode : all_instances) {
10✔
261
            if(Botan::DilithiumMode(mode).is_available()) {
9✔
262
               available_instances.push_back(mode);
9✔
263
            }
264
         }
265
         return available_instances;
1✔
266
      }
1✔
267

268
      std::string algo_name(std::string_view param) const override {
9✔
269
         if(param.starts_with("Dilithium-")) {
9✔
270
            return "Dilithium";
6✔
271
         } else {
272
            return "ML-DSA";
3✔
273
         }
274
      }
275

276
      std::string algo_name() const override { throw Test_Error("No default algo name set for Dilithium"); }
×
277

278
      std::unique_ptr<Botan::Public_Key> public_key_from_raw(std::string_view keygen_params,
9✔
279
                                                             std::string_view /* provider */,
280
                                                             std::span<const uint8_t> raw_pk) const override {
281
         return std::make_unique<Botan::Dilithium_PublicKey>(raw_pk, Botan::DilithiumMode(keygen_params));
9✔
282
      }
283
};
284

285
BOTAN_REGISTER_TEST("pubkey", "dilithium_keygen", Dilithium_Keygen_Tests);
286

287
class MldsaCertificateTests final : public Test {
1✔
288
   public:
289
      std::vector<Test::Result> run() override {
1✔
290
         std::vector<Test::Result> result_vec;
1✔
291

292
         std::vector<std::string> const cert_file_names = {
1✔
293
            "mldsa44_rfc9881.pem.crt", "mldsa65_rfc9881.pem.crt", "mldsa87_rfc9881.pem.crt"};
1✔
294

295
         for(auto const& cert_file : cert_file_names) {
4✔
296
            Botan::X509_Certificate const cert(Test::data_file("x509/mldsa/" + cert_file));
6✔
297
            Test::Result this_result(cert_file);
3✔
298
            auto ver_res = cert.verify_signature(*cert.subject_public_key());
3✔
299

300
            this_result.test_is_true("signature of certificate verifies",
×
301
                                ver_res.first == Botan::Certificate_Status_Code::OK);
3✔
302
            result_vec.push_back(this_result);
3✔
303
         }
3✔
304
         return result_vec;
1✔
305
      }
1✔
306
};
307

308
BOTAN_REGISTER_TEST("pubkey", "mldsa_certificate", MldsaCertificateTests);
309

310
#endif
311

312
}  // namespace Botan_Tests
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc