• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

randombit / botan / 23151525988

16 Mar 2026 03:26PM UTC coverage: 89.774% (+0.02%) from 89.759%
23151525988

Pull #5451

github

web-flow
Merge c5a4f30ee into 4f6f5bbaf
Pull Request #5451: MLDSA-composite

105271 of 117262 relevant lines covered (89.77%)

12140285.62 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

55.9
/src/cli/perf_pk_sig.cpp
1
/*
2
* (C) 2024 Jack Lloyd
3
*
4
* Botan is released under the Simplified BSD License (see license.txt)
5
*/
6

7
#include "perf.h"
8

9
#if defined(BOTAN_HAS_PUBLIC_KEY_CRYPTO)
10
   #include <botan/pk_algs.h>
11
   #include <botan/pubkey.h>
12
   #include <botan/rng.h>
13
   #include <botan/internal/fmt.h>
14
#endif
15

16
#if defined(BOTAN_HAS_MLDSA_COMPOSITE)
17
   #include <botan/mldsa_comp.h>
18
   #include <botan/mldsa_comp_parameters.h>
19
#endif
20

21
namespace Botan_CLI {
22

23
#if defined(BOTAN_HAS_PUBLIC_KEY_CRYPTO)
24

25
class PerfTest_PKSig : public PerfTest {
9✔
26
   public:
27
      virtual std::string algo() const = 0;
28

29
      virtual std::string hash() const { return "SHA-256"; }
4✔
30

31
      virtual std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const { return {""}; }
2✔
32

33
      void go(const PerfConfig& config) override {
9✔
34
         const std::string alg = this->algo();
9✔
35
         const std::string padding = this->hash();
9✔
36

37
         const auto params = this->keygen_params(config);
9✔
38

39
         for(const auto& param : params) {
37✔
40
            const std::string nm = this->format_name(alg, param);
28✔
41
            bench_pk_sig(config, nm, alg, param, padding);
56✔
42
         }
28✔
43
      }
9✔
44

45
      static void bench_pk_sig(const PerfConfig& config,
28✔
46
                               const std::string& nm,
47
                               const std::string& alg,
48
                               const std::string& param,
49
                               const std::string& padding,
50
                               const std::string& provider = "") {
51
         auto& rng = config.rng();
28✔
52
         const auto msec = config.runtime();
28✔
53

54
         auto keygen_timer = config.make_timer(nm, 1, "keygen");
56✔
55

56
         auto sk = keygen_timer->run([&] { return Botan::create_private_key(alg, rng, param); });
56✔
57

58
         if(sk != nullptr) {
28✔
59
            while(keygen_timer->under(msec)) {
79✔
60
               sk = keygen_timer->run([&] { return Botan::create_private_key(alg, rng, param); });
153✔
61
            }
62

63
            config.record_result(*keygen_timer);
28✔
64

65
            auto pk = sk->public_key();
28✔
66

67
            std::vector<uint8_t> message;
28✔
68
            std::vector<uint8_t> signature;
28✔
69
            std::vector<uint8_t> bad_signature;
28✔
70

71
            Botan::PK_Signer sig(*sk, rng, padding, Botan::Signature_Format::Standard, provider);
28✔
72
            Botan::PK_Verifier ver(*pk, padding, Botan::Signature_Format::Standard, provider);
28✔
73

74
            auto sig_timer = config.make_timer(nm, 1, "sign");
56✔
75
            auto ver_timer = config.make_timer(nm, 1, "verify");
56✔
76

77
            size_t invalid_sigs = 0;
28✔
78

79
            while(ver_timer->under(msec) || sig_timer->under(msec)) {
170✔
80
               if(signature.empty() || sig_timer->under(msec)) {
114✔
81
                  /*
82
                  Length here is kind of arbitrary, but 48 bytes fits into a single
83
                  hash block so minimizes hashing overhead versus the PK op itself.
84
                  */
85
                  rng.random_vec(message, 48);
108✔
86

87
                  signature = sig_timer->run([&]() { return sig.sign_message(message, rng); });
216✔
88

89
                  bad_signature = signature;
108✔
90
                  bad_signature[rng.next_byte() % bad_signature.size()] ^= rng.next_nonzero_byte();
108✔
91
               }
92

93
               if(ver_timer->under(msec)) {
114✔
94
                  const bool verified = ver_timer->run([&] { return ver.verify_message(message, signature); });
86✔
95

96
                  if(!verified) {
43✔
97
                     invalid_sigs += 1;
×
98
                  }
99

100
                  const bool verified_bad = ver_timer->run([&] { return ver.verify_message(message, bad_signature); });
86✔
101

102
                  if(verified_bad) {
43✔
103
                     config.error_output() << "Bad signature accepted in " << nm << " signature bench\n";
×
104
                  }
105
               }
106
            }
107

108
            if(invalid_sigs > 0) {
28✔
109
               config.error_output() << invalid_sigs << " generated signatures rejected in " << nm
×
110
                                     << " signature bench\n";
×
111
            }
112
            config.record_result(*sig_timer);
28✔
113
            config.record_result(*ver_timer);
56✔
114
         }
56✔
115
      }
28✔
116
};
117

118
#endif
119

120
#if defined(BOTAN_HAS_DSA)
121

122
class PerfTest_DSA final : public PerfTest_PKSig {
1✔
123
   public:
124
      std::string algo() const override { return "DSA"; }
1✔
125

126
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
1✔
127
         return {"dsa/jce/1024", "dsa/botan/2048", "dsa/botan/3072"};
1✔
128
      }
129

130
      std::string format_name(const std::string& alg, const std::string& param) const override {
3✔
131
         return Botan::fmt("{}-{}", alg, param.substr(param.find_last_of('/') + 1));
6✔
132
      }
133
};
134

135
BOTAN_REGISTER_PERF_TEST("DSA", PerfTest_DSA);
1✔
136

137
#endif
138

139
#if defined(BOTAN_HAS_RSA)
140

141
class PerfTest_RSA final : public PerfTest_PKSig {
×
142
   public:
143
      std::string algo() const override { return "RSA"; }
×
144

145
      std::string hash() const override { return "PKCS1v15(SHA-256)"; }
×
146

147
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
×
148
         return {"1024", "2048", "3072", "4096"};
×
149
      }
150
};
151

152
BOTAN_REGISTER_PERF_TEST("RSA", PerfTest_RSA);
×
153

154
#endif
155

156
#if defined(BOTAN_HAS_ECDSA)
157

158
class PerfTest_ECDSA final : public PerfTest_PKSig {
1✔
159
   public:
160
      std::string algo() const override { return "ECDSA"; }
1✔
161

162
      std::vector<std::string> keygen_params(const PerfConfig& config) const override { return config.ecc_groups(); }
1✔
163
};
164

165
BOTAN_REGISTER_PERF_TEST("ECDSA", PerfTest_ECDSA);
1✔
166

167
#endif
168

169
#if defined(BOTAN_HAS_ECKCDSA)
170

171
class PerfTest_ECKCDSA final : public PerfTest_PKSig {
1✔
172
   public:
173
      std::string algo() const override { return "ECKCDSA"; }
1✔
174

175
      std::vector<std::string> keygen_params(const PerfConfig& config) const override { return config.ecc_groups(); }
1✔
176
};
177

178
BOTAN_REGISTER_PERF_TEST("ECKCDSA", PerfTest_ECKCDSA);
1✔
179

180
#endif
181

182
#if defined(BOTAN_HAS_ECGDSA)
183

184
class PerfTest_ECGDSA final : public PerfTest_PKSig {
1✔
185
   public:
186
      std::string algo() const override { return "ECGDSA"; }
1✔
187

188
      std::vector<std::string> keygen_params(const PerfConfig& config) const override { return config.ecc_groups(); }
1✔
189
};
190

191
BOTAN_REGISTER_PERF_TEST("ECGDSA", PerfTest_ECGDSA);
1✔
192

193
#endif
194

195
#if defined(BOTAN_HAS_GOST_34_10_2001) && defined(BOTAN_HAS_GOST_34_11)
196

197
class PerfTest_Gost3410 final : public PerfTest_PKSig {
1✔
198
   public:
199
      std::string algo() const override { return "GOST-34.10"; }
1✔
200

201
      std::string hash() const override { return "GOST-34.11"; }
1✔
202

203
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override { return {"gost_256A"}; }
1✔
204
};
205

206
BOTAN_REGISTER_PERF_TEST("GOST-34.10", PerfTest_Gost3410);
1✔
207

208
#endif
209

210
#if defined(BOTAN_HAS_SM2) && defined(BOTAN_HAS_SM3)
211

212
class PerfTest_SM2 final : public PerfTest_PKSig {
1✔
213
   public:
214
      std::string algo() const override { return "SM2"; }
1✔
215

216
      std::string hash() const override { return "SM3"; }
1✔
217

218
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override { return {"sm2p256v1"}; }
1✔
219
};
220

221
BOTAN_REGISTER_PERF_TEST("SM2", PerfTest_SM2);
1✔
222

223
#endif
224

225
#if defined(BOTAN_HAS_ED25519)
226

227
class PerfTest_Ed25519 final : public PerfTest_PKSig {
1✔
228
   public:
229
      std::string algo() const override { return "Ed25519"; }
1✔
230

231
      std::string hash() const override { return "Pure"; }
1✔
232
};
233

234
BOTAN_REGISTER_PERF_TEST("Ed25519", PerfTest_Ed25519);
1✔
235

236
#endif
237

238
#if defined(BOTAN_HAS_ED448)
239

240
class PerfTest_Ed448 final : public PerfTest_PKSig {
1✔
241
   public:
242
      std::string algo() const override { return "Ed448"; }
1✔
243

244
      std::string hash() const override { return "Pure"; }
1✔
245
};
246

247
BOTAN_REGISTER_PERF_TEST("Ed448", PerfTest_Ed448);
1✔
248

249
#endif
250

251
#if defined(BOTAN_HAS_XMSS_RFC8391)
252

253
class PerfTest_XMSS final : public PerfTest_PKSig {
×
254
   public:
255
      std::string algo() const override { return "XMSS"; }
×
256

257
      std::string hash() const override { return ""; }
×
258

259
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
×
260
         /*
261
         We only test H10 signatures here since already they are quite slow (a
262
         few seconds per signature). On a fast machine, H16 signatures take 1-2
263
         minutes to generate and H20 signatures take 5-10 minutes to generate
264
         */
265
         return {
×
266
            "XMSS-SHA2_10_256",
267
            "XMSS-SHAKE_10_256",
268
            "XMSS-SHA2_10_512",
269
            "XMSS-SHAKE_10_512",
270
         };
×
271
      }
272
};
273

274
BOTAN_REGISTER_PERF_TEST("XMSS", PerfTest_XMSS);
×
275

276
#endif
277

278
#if defined(BOTAN_HAS_HSS_LMS)
279

280
class PerfTest_HSS_LMS final : public PerfTest_PKSig {
×
281
   public:
282
      std::string algo() const override { return "HSS-LMS"; }
×
283

284
      std::string hash() const override { return ""; }
×
285

286
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
×
287
         // At first we compare instances with multiple hash functions. LMS trees with
288
         // height 10 are suitable, since they can be used for enough signatures and are
289
         // fast enough for speed testing.
290
         // Afterward, setups with multiple HSS layers are tested
291
         return {"SHA-256,HW(10,1)",
×
292
                 "SHAKE-256(256),HW(10,1)",
293
                 "SHAKE-256(192),HW(10,1)",
294
                 "Truncated(SHA-256,192),HW(10,1)",
295
                 "SHA-256,HW(10,1),HW(10,1)",
296
                 "SHA-256,HW(10,1),HW(10,1),HW(10,1)"};
×
297
      }
298
};
299

300
BOTAN_REGISTER_PERF_TEST("HSS-LMS", PerfTest_HSS_LMS);
×
301

302
#endif
303

304
#if defined(BOTAN_HAS_SPHINCS_PLUS_WITH_SHA2) || defined(BOTAN_HAS_SPHINCS_PLUS_WITH_SHAKE)
305

306
class PerfTest_SPHINCSp final : public PerfTest_PKSig {
×
307
   public:
308
      std::string algo() const override { return "SPHINCS+"; }
×
309

310
      std::string hash() const override { return ""; }
×
311

312
      std::string format_name(const std::string& alg, const std::string& param) const override {
×
313
         return alg + param.substr(11);
×
314
      }
315

316
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
×
317
         return {"SphincsPlus-sha2-128s-r3.1",
×
318
                 "SphincsPlus-sha2-128f-r3.1",
319
                 "SphincsPlus-sha2-192s-r3.1",
320
                 "SphincsPlus-sha2-192f-r3.1",
321
                 "SphincsPlus-sha2-256s-r3.1",
322
                 "SphincsPlus-sha2-256f-r3.1",
323
                 "SphincsPlus-shake-128s-r3.1",
324
                 "SphincsPlus-shake-128f-r3.1",
325
                 "SphincsPlus-shake-192s-r3.1",
326
                 "SphincsPlus-shake-192f-r3.1",
327
                 "SphincsPlus-shake-256s-r3.1",
328
                 "SphincsPlus-shake-256f-r3.1"};
×
329
      }
330
};
331

332
BOTAN_REGISTER_PERF_TEST("SPHINCS+", PerfTest_SPHINCSp);
×
333

334
#endif
335

336
#if defined(BOTAN_HAS_SLH_DSA_WITH_SHA2) || defined(BOTAN_HAS_SLH_DSA_WITH_SHAKE)
337

338
class PerfTest_SLH_DSA final : public PerfTest_PKSig {
×
339
   public:
340
      std::string algo() const override { return "SLH-DSA"; }
×
341

342
      std::string hash() const override { return ""; }
×
343

344
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
×
345
         return {"SLH-DSA-SHA2-128s",
×
346
                 "SLH-DSA-SHA2-128f",
347
                 "SLH-DSA-SHA2-192s",
348
                 "SLH-DSA-SHA2-192f",
349
                 "SLH-DSA-SHA2-256s",
350
                 "SLH-DSA-SHA2-256f",
351
                 "SLH-DSA-SHAKE-128s",
352
                 "SLH-DSA-SHAKE-128f",
353
                 "SLH-DSA-SHAKE-192s",
354
                 "SLH-DSA-SHAKE-192f",
355
                 "SLH-DSA-SHAKE-256s",
356
                 "SLH-DSA-SHAKE-256f"};
×
357
      }
358
};
359

360
BOTAN_REGISTER_PERF_TEST("SLH-DSA", PerfTest_SLH_DSA);
×
361

362
#endif
363

364
#if defined(BOTAN_HAS_DILITHIUM) || defined(BOTAN_HAS_DILITHIUM_AES)
365

366
class PerfTest_Dilithium final : public PerfTest_PKSig {
×
367
   public:
368
      std::string algo() const override { return "Dilithium"; }
×
369

370
      std::string hash() const override { return ""; }
×
371

372
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
×
373
         return {
×
374
            "Dilithium-4x4-r3",
375
            "Dilithium-4x4-AES-r3",
376
            "Dilithium-6x5-r3",
377
            "Dilithium-6x5-AES-r3",
378
            "Dilithium-8x7-r3",
379
            "Dilithium-8x7-AES-r3",
380
         };
×
381
      }
382
};
383

384
BOTAN_REGISTER_PERF_TEST("Dilithium", PerfTest_Dilithium);
×
385

386
#endif
387

388
#if defined(BOTAN_HAS_ML_DSA)
389

390
class PerfTest_ML_DSA final : public PerfTest_PKSig {
1✔
391
   public:
392
      std::string algo() const override { return "ML-DSA"; }
1✔
393

394
      std::string hash() const override { return ""; }
1✔
395

396
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
1✔
397
         return {
1✔
398
            "ML-DSA-4x4",
399
            "ML-DSA-6x5",
400
            "ML-DSA-8x7",
401
         };
1✔
402
      }
403
};
404

405
BOTAN_REGISTER_PERF_TEST("ML-DSA", PerfTest_ML_DSA);
1✔
406

407
#endif
408

409
#if defined(BOTAN_HAS_MLDSA_COMPOSITE)
410

411
template <Botan::MLDSA_Composite_Param::id_t A>
412
class PerfTest_MLDSA_Composite final : public PerfTest_PKSig {
×
413
   public:
414
      std::string algo() const override { return Botan::MLDSA_Composite_Param::from_id_or_throw(A).id_str(); }
×
415

416
      std::string hash() const override { return ""; }
×
417

418
      std::vector<std::string> keygen_params(const PerfConfig& /*config*/) const override {
×
419
         return {Botan::MLDSA_Composite_Param::from_id_or_throw(A).id_str()};
×
420
      }
×
421
};
422

423
// NOLINTNEXTLINE(bugprone-macro-parentheses)
424
   #define BOTAN_REGISTER_PERF_TEST_TMPL(name, Perf_Class)                                   \
425
      /* NOLINTNEXTLINE(cert-err58-cpp) */                                                   \
426
      const Botan_CLI::PerfTest::Registration reg_perf_##Perf_Class##_##name(                \
427
         #name, []() -> std::unique_ptr<Botan_CLI::PerfTest> {                               \
428
            return std::make_unique<Perf_Class<Botan::MLDSA_Composite_Param::id_t::name>>(); \
429
         })
430

431
   #if defined(BOTAN_HAS_RSA)
432
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA44_RSA2048_PKCS15_SHA256, PerfTest_MLDSA_Composite);
×
433
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_RSA3072_PKCS15_SHA512, PerfTest_MLDSA_Composite);
×
434
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_RSA4096_PKCS15_SHA512, PerfTest_MLDSA_Composite);
×
435
   #endif
436
   #if defined(BOTAN_HAS_PSS)
437
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA44_RSA2048_PSS_SHA256, PerfTest_MLDSA_Composite);
×
438
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_RSA3072_PSS_SHA512, PerfTest_MLDSA_Composite);
×
439
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_RSA4096_PSS_SHA512, PerfTest_MLDSA_Composite);
×
440
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA87_RSA3072_PSS_SHA512, PerfTest_MLDSA_Composite);
×
441
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA87_RSA4096_PSS_SHA512, PerfTest_MLDSA_Composite);
×
442
   #endif
443
   #if defined(BOTAN_HAS_ECDSA)
444
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA44_ECDSA_P256_SHA256, PerfTest_MLDSA_Composite);
×
445
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_ECDSA_P256_SHA512, PerfTest_MLDSA_Composite);
×
446
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_ECDSA_P384_SHA512, PerfTest_MLDSA_Composite);
×
447
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_ECDSA_brainpoolP256r1_SHA512, PerfTest_MLDSA_Composite);
×
448
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA87_ECDSA_P384_SHA512, PerfTest_MLDSA_Composite);
×
449
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA87_ECDSA_brainpoolP384r1_SHA512, PerfTest_MLDSA_Composite);
×
450
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA87_ECDSA_P521_SHA512, PerfTest_MLDSA_Composite);
×
451
   #endif
452
   #if defined(BOTAN_HAS_ED25519)
453
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA44_Ed25519_SHA512, PerfTest_MLDSA_Composite);
×
454
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA65_Ed25519_SHA512, PerfTest_MLDSA_Composite);
×
455
   #endif
456
   #if defined(BOTAN_HAS_ED448)
457
BOTAN_REGISTER_PERF_TEST_TMPL(MLDSA87_Ed448_SHAKE256, PerfTest_MLDSA_Composite);
×
458
   #endif
459
#endif
460

461
}  // namespace Botan_CLI
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc