Skip to content

Conversation

@sgmenda-aws
Copy link
Contributor

Issues:

N/A -- AWS-LC does not have a systematic way to track and sync cryptographic test vectors from external sources like Wycheproof.

Description of changes:

This PR adds third_party/vectors/ with:

  • sync.py - python script to sync existing vectors and add new ones
  • sources.toml - straightforward config of upstream sources
  • vectorslib/ - utility functions (will host upcoming conversion logic)
  • upstream/ - unmodified upstream test vectors (always checked in for transparency)
    • upstream/wycheproof/- initial import from Wycheproof including LICENSE and aes_gcm_test.json

Call-outs:

  • conversion hasn't yet been implemented, convert_sources() is a placeholder - will be implemented in the next PR
  • --check mode is documented but not yet implemented

Testing:

Manually tested:

  • ./sync.py --new wycheproof/testvectors_v1/aes_gcm_test.json successfully adds new file
  • ./sync.py verifies existing files are in sync with upstream
  • successfully handles error cases: invalid source names, missing files, and duplicate files

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and the ISC license.

@sgmenda-aws sgmenda-aws requested a review from a team as a code owner November 11, 2025 01:24
@codecov-commenter
Copy link

codecov-commenter commented Nov 11, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 78.24%. Comparing base (c366f68) to head (cfab3ad).

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2811      +/-   ##
==========================================
- Coverage   78.24%   78.24%   -0.01%     
==========================================
  Files         683      683              
  Lines      117187   117187              
  Branches    16476    16476              
==========================================
- Hits        91694    91693       -1     
- Misses      24609    24611       +2     
+ Partials      884      883       -1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

samuel40791765 and others added 4 commits November 11, 2025 12:45
### Description of changes: 
I discovered this edge case when working with an older Ruby version.
This discrepancy only exists in older versions since Ruby openssl
migrated from using the `HMAC_CTX` APIs to use the `EVP` layer in 3.1:
ruby/ruby@b91f62f.


[`test_reset_keep_key`](https://github.com/ruby/ruby/blame/cf4a034d59913fb71a7dd1b052164984be4a3d14/test/openssl/test_hmac.rb#L37-L43)
was failing since we were MACing the data twice. It turns out the call
to `h1.reset` wasn't working properly and this was due to our
implementation of `HMAC_Init_ex` not reinitializing the data input when
only `HMAC_Update` had been called. According to the original function
contract, `HMAC_Init_ex` should reinitialize the inputted data, but the
computed key should still be preserved.

This is a minor edge case due to how older versions of Ruby were
consuming `HMAC_CTX`. [Their
call](https://github.com/ruby/ruby/blob/ruby_2_7/ext/openssl/ossl_hmac.c#L167-L174)
to `HMAC_Final` was called upon a copy of the original `HMAC_CTX`. The
original `HMAC_CTX` was always within a `HMAC_Update` state and AWS-LC
was not properly reinitializing these cases.

### Call-outs:
N/A

### Testing:
New tests

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.
### Description of changes: 
Prepare release v1.64.0.


### What's Changed
* Update max polyz value by @jakemas in
aws#2787
* ECR Repositories for Android and Formal Verification Images by
@skmcgrail in aws#2794
* Support more "openssl rsa" options by @justsmth in
aws#2777
* Remove python codebuild patches by @WillChilds-Klein in
aws#2793
* Additional options for "openssl c_client" by @justsmth in
aws#2791
* GitHub-based Formal Verification Image Build by @skmcgrail in
aws#2796
* Use C++11 atomics to update session stats by @justsmth in
aws#2786
* Support "openssl dhparam" by @justsmth in
aws#2790
* Add scrutinice pull permissions for aws-lc/amazonlinux repository by
@skmcgrail in aws#2799
* Use GitHub-based Verification Images by @skmcgrail in
aws#2798
* Remove dead code by @torben-hansen in
aws#2797
* Rename snapsafe to VM UBE by @torben-hansen in
aws#2800
* Bump MySQL version tag to 9.5.0 by @samuel40791765 in
aws#2768
* Migrate to macos-15-intel by @samuel40791765 in
aws#2802
* Use right compiler with ruby CI by @samuel40791765 in
aws#2801
* Migrate analytics job to be GitHub triggered by @skmcgrail in
aws#2779
* Support NetBSD by @justsmth in aws#2754
* Make poly_chknorm constant flow by @jakemas in
aws#2788
* Rename fork to fork UBE by @torben-hansen in
aws#2803
* Extend grv asan timeout for Golang to allow completion by
@torben-hansen in aws#2805

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.
@sgmenda-aws
Copy link
Contributor Author

@torben-hansen thanks for the patient review, resolving now.

torben-hansen
torben-hansen previously approved these changes Nov 13, 2025
@sgmenda-aws sgmenda-aws enabled auto-merge (squash) November 14, 2025 19:16
@sgmenda-aws sgmenda-aws merged commit 1820fee into aws:main Nov 14, 2025
388 of 390 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants