xref: /aosp_15_r20/hardware/interfaces/keymaster/4.0/vts/functional/HmacKeySharingTest.cpp (revision 4d7e907c777eeecc4c5bd7cf640a754fac206ff7)
1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker  * Copyright (C) 2017 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker  *
4*4d7e907cSAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker  *
8*4d7e907cSAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker  *
10*4d7e907cSAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker  * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker  */
16*4d7e907cSAndroid Build Coastguard Worker 
17*4d7e907cSAndroid Build Coastguard Worker #include "KeymasterHidlTest.h"
18*4d7e907cSAndroid Build Coastguard Worker 
19*4d7e907cSAndroid Build Coastguard Worker namespace android {
20*4d7e907cSAndroid Build Coastguard Worker namespace hardware {
21*4d7e907cSAndroid Build Coastguard Worker namespace keymaster {
22*4d7e907cSAndroid Build Coastguard Worker namespace V4_0 {
23*4d7e907cSAndroid Build Coastguard Worker namespace test {
24*4d7e907cSAndroid Build Coastguard Worker 
25*4d7e907cSAndroid Build Coastguard Worker /**
26*4d7e907cSAndroid Build Coastguard Worker  * HmacKeySharingTest extends KeymasterHidlTest with some utilities that make writing HMAC sharing
27*4d7e907cSAndroid Build Coastguard Worker  * tests easier.
28*4d7e907cSAndroid Build Coastguard Worker  */
29*4d7e907cSAndroid Build Coastguard Worker class HmacKeySharingTest : public KeymasterHidlTest {
30*4d7e907cSAndroid Build Coastguard Worker    protected:
allKeymasters()31*4d7e907cSAndroid Build Coastguard Worker      const std::vector<sp<IKeymasterDevice>>& allKeymasters() {
32*4d7e907cSAndroid Build Coastguard Worker          if (all_keymasters_.empty()) {
33*4d7e907cSAndroid Build Coastguard Worker              auto names = android::hardware::getAllHalInstanceNames(IKeymasterDevice::descriptor);
34*4d7e907cSAndroid Build Coastguard Worker              for (const auto& name : names) {
35*4d7e907cSAndroid Build Coastguard Worker                  all_keymasters_.push_back(IKeymasterDevice::getService(name));
36*4d7e907cSAndroid Build Coastguard Worker              }
37*4d7e907cSAndroid Build Coastguard Worker          }
38*4d7e907cSAndroid Build Coastguard Worker          return all_keymasters_;
39*4d7e907cSAndroid Build Coastguard Worker      }
40*4d7e907cSAndroid Build Coastguard Worker 
41*4d7e907cSAndroid Build Coastguard Worker     struct GetParamsResult {
42*4d7e907cSAndroid Build Coastguard Worker         ErrorCode error;
43*4d7e907cSAndroid Build Coastguard Worker         HmacSharingParameters params;
tieandroid::hardware::keymaster::V4_0::test::HmacKeySharingTest::GetParamsResult44*4d7e907cSAndroid Build Coastguard Worker         auto tie() { return std::tie(error, params); }
45*4d7e907cSAndroid Build Coastguard Worker     };
46*4d7e907cSAndroid Build Coastguard Worker 
47*4d7e907cSAndroid Build Coastguard Worker     struct ComputeHmacResult {
48*4d7e907cSAndroid Build Coastguard Worker         ErrorCode error;
49*4d7e907cSAndroid Build Coastguard Worker         HidlBuf sharing_check;
tieandroid::hardware::keymaster::V4_0::test::HmacKeySharingTest::ComputeHmacResult50*4d7e907cSAndroid Build Coastguard Worker         auto tie() { return std::tie(error, sharing_check); }
51*4d7e907cSAndroid Build Coastguard Worker     };
52*4d7e907cSAndroid Build Coastguard Worker 
53*4d7e907cSAndroid Build Coastguard Worker     using KeymasterVec = std::vector<sp<IKeymasterDevice>>;
54*4d7e907cSAndroid Build Coastguard Worker     using ByteString = std::vector<uint8_t>;
55*4d7e907cSAndroid Build Coastguard Worker     // using NonceVec = std::vector<HidlBuf>;
56*4d7e907cSAndroid Build Coastguard Worker 
getHmacSharingParameters(IKeymasterDevice & keymaster)57*4d7e907cSAndroid Build Coastguard Worker     GetParamsResult getHmacSharingParameters(IKeymasterDevice& keymaster) {
58*4d7e907cSAndroid Build Coastguard Worker         GetParamsResult result;
59*4d7e907cSAndroid Build Coastguard Worker         EXPECT_TRUE(keymaster
60*4d7e907cSAndroid Build Coastguard Worker                         .getHmacSharingParameters([&](auto error, auto params) {
61*4d7e907cSAndroid Build Coastguard Worker                             result.tie() = std::tie(error, params);
62*4d7e907cSAndroid Build Coastguard Worker                         })
63*4d7e907cSAndroid Build Coastguard Worker                         .isOk());
64*4d7e907cSAndroid Build Coastguard Worker         return result;
65*4d7e907cSAndroid Build Coastguard Worker     }
66*4d7e907cSAndroid Build Coastguard Worker 
getHmacSharingParameters(const KeymasterVec & keymasters)67*4d7e907cSAndroid Build Coastguard Worker     hidl_vec<HmacSharingParameters> getHmacSharingParameters(const KeymasterVec& keymasters) {
68*4d7e907cSAndroid Build Coastguard Worker         std::vector<HmacSharingParameters> paramsVec;
69*4d7e907cSAndroid Build Coastguard Worker         for (auto& keymaster : keymasters) {
70*4d7e907cSAndroid Build Coastguard Worker             auto result = getHmacSharingParameters(*keymaster);
71*4d7e907cSAndroid Build Coastguard Worker             EXPECT_EQ(ErrorCode::OK, result.error);
72*4d7e907cSAndroid Build Coastguard Worker             if (result.error == ErrorCode::OK) paramsVec.push_back(std::move(result.params));
73*4d7e907cSAndroid Build Coastguard Worker         }
74*4d7e907cSAndroid Build Coastguard Worker         return paramsVec;
75*4d7e907cSAndroid Build Coastguard Worker     }
76*4d7e907cSAndroid Build Coastguard Worker 
computeSharedHmac(IKeymasterDevice & keymaster,const hidl_vec<HmacSharingParameters> & params)77*4d7e907cSAndroid Build Coastguard Worker     ComputeHmacResult computeSharedHmac(IKeymasterDevice& keymaster,
78*4d7e907cSAndroid Build Coastguard Worker                                         const hidl_vec<HmacSharingParameters>& params) {
79*4d7e907cSAndroid Build Coastguard Worker         ComputeHmacResult result;
80*4d7e907cSAndroid Build Coastguard Worker         EXPECT_TRUE(keymaster
81*4d7e907cSAndroid Build Coastguard Worker                         .computeSharedHmac(params,
82*4d7e907cSAndroid Build Coastguard Worker                                            [&](auto error, auto params) {
83*4d7e907cSAndroid Build Coastguard Worker                                                result.tie() = std::tie(error, params);
84*4d7e907cSAndroid Build Coastguard Worker                                            })
85*4d7e907cSAndroid Build Coastguard Worker                         .isOk());
86*4d7e907cSAndroid Build Coastguard Worker         return result;
87*4d7e907cSAndroid Build Coastguard Worker     }
88*4d7e907cSAndroid Build Coastguard Worker 
computeSharedHmac(const KeymasterVec & keymasters,const hidl_vec<HmacSharingParameters> & paramsVec)89*4d7e907cSAndroid Build Coastguard Worker     std::vector<ComputeHmacResult> computeSharedHmac(
90*4d7e907cSAndroid Build Coastguard Worker         const KeymasterVec& keymasters, const hidl_vec<HmacSharingParameters>& paramsVec) {
91*4d7e907cSAndroid Build Coastguard Worker         std::vector<ComputeHmacResult> resultVec;
92*4d7e907cSAndroid Build Coastguard Worker         for (auto& keymaster : keymasters) {
93*4d7e907cSAndroid Build Coastguard Worker             resultVec.push_back(computeSharedHmac(*keymaster, paramsVec));
94*4d7e907cSAndroid Build Coastguard Worker         }
95*4d7e907cSAndroid Build Coastguard Worker         return resultVec;
96*4d7e907cSAndroid Build Coastguard Worker     }
97*4d7e907cSAndroid Build Coastguard Worker 
copyNonces(const hidl_vec<HmacSharingParameters> & paramsVec)98*4d7e907cSAndroid Build Coastguard Worker     std::vector<ByteString> copyNonces(const hidl_vec<HmacSharingParameters>& paramsVec) {
99*4d7e907cSAndroid Build Coastguard Worker         std::vector<ByteString> nonces;
100*4d7e907cSAndroid Build Coastguard Worker         for (auto& param : paramsVec) {
101*4d7e907cSAndroid Build Coastguard Worker             nonces.emplace_back(param.nonce.data(), param.nonce.data() + param.nonce.size());
102*4d7e907cSAndroid Build Coastguard Worker         }
103*4d7e907cSAndroid Build Coastguard Worker         return nonces;
104*4d7e907cSAndroid Build Coastguard Worker     }
105*4d7e907cSAndroid Build Coastguard Worker 
verifyResponses(const HidlBuf & expected,const std::vector<ComputeHmacResult> & responses)106*4d7e907cSAndroid Build Coastguard Worker     void verifyResponses(const HidlBuf& expected, const std::vector<ComputeHmacResult>& responses) {
107*4d7e907cSAndroid Build Coastguard Worker         for (auto& response : responses) {
108*4d7e907cSAndroid Build Coastguard Worker             EXPECT_EQ(ErrorCode::OK, response.error);
109*4d7e907cSAndroid Build Coastguard Worker             EXPECT_EQ(expected, response.sharing_check) << "Sharing check values should match.";
110*4d7e907cSAndroid Build Coastguard Worker         }
111*4d7e907cSAndroid Build Coastguard Worker     }
112*4d7e907cSAndroid Build Coastguard Worker 
113*4d7e907cSAndroid Build Coastguard Worker   private:
114*4d7e907cSAndroid Build Coastguard Worker     static std::vector<sp<IKeymasterDevice>> all_keymasters_;
115*4d7e907cSAndroid Build Coastguard Worker };
116*4d7e907cSAndroid Build Coastguard Worker 
117*4d7e907cSAndroid Build Coastguard Worker std::vector<sp<IKeymasterDevice>> HmacKeySharingTest::all_keymasters_;
118*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(HmacKeySharingTest,GetParameters)119*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, GetParameters) {
120*4d7e907cSAndroid Build Coastguard Worker     auto result1 = getHmacSharingParameters(keymaster());
121*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(ErrorCode::OK, result1.error);
122*4d7e907cSAndroid Build Coastguard Worker 
123*4d7e907cSAndroid Build Coastguard Worker     auto result2 = getHmacSharingParameters(keymaster());
124*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(ErrorCode::OK, result2.error);
125*4d7e907cSAndroid Build Coastguard Worker 
126*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(result1.params.seed, result2.params.seed)
127*4d7e907cSAndroid Build Coastguard Worker         << "A given keymaster should always return the same seed.";
128*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(result1.params.nonce, result2.params.nonce)
129*4d7e907cSAndroid Build Coastguard Worker         << "A given keymaster should always return the same nonce until restart.";
130*4d7e907cSAndroid Build Coastguard Worker }
131*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(HmacKeySharingTest,ComputeSharedHmac)132*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, ComputeSharedHmac) {
133*4d7e907cSAndroid Build Coastguard Worker     auto params = getHmacSharingParameters(allKeymasters());
134*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(allKeymasters().size(), params.size())
135*4d7e907cSAndroid Build Coastguard Worker             << "One or more keymasters failed to provide parameters.";
136*4d7e907cSAndroid Build Coastguard Worker 
137*4d7e907cSAndroid Build Coastguard Worker     auto nonces = copyNonces(params);
138*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(allKeymasters().size(), nonces.size());
139*4d7e907cSAndroid Build Coastguard Worker     std::sort(nonces.begin(), nonces.end());
140*4d7e907cSAndroid Build Coastguard Worker     nonces.erase(std::unique(nonces.begin(), nonces.end()), nonces.end());
141*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(allKeymasters().size(), nonces.size());
142*4d7e907cSAndroid Build Coastguard Worker 
143*4d7e907cSAndroid Build Coastguard Worker     auto responses = computeSharedHmac(allKeymasters(), params);
144*4d7e907cSAndroid Build Coastguard Worker     ASSERT_GT(responses.size(), 0U);
145*4d7e907cSAndroid Build Coastguard Worker     verifyResponses(responses[0].sharing_check, responses);
146*4d7e907cSAndroid Build Coastguard Worker 
147*4d7e907cSAndroid Build Coastguard Worker     // Do it a second time.  Should get the same answers.
148*4d7e907cSAndroid Build Coastguard Worker     params = getHmacSharingParameters(allKeymasters());
149*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(allKeymasters().size(), params.size())
150*4d7e907cSAndroid Build Coastguard Worker             << "One or more keymasters failed to provide parameters.";
151*4d7e907cSAndroid Build Coastguard Worker 
152*4d7e907cSAndroid Build Coastguard Worker     responses = computeSharedHmac(allKeymasters(), params);
153*4d7e907cSAndroid Build Coastguard Worker     ASSERT_GT(responses.size(), 0U);
154*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(32U, responses[0].sharing_check.size());
155*4d7e907cSAndroid Build Coastguard Worker     verifyResponses(responses[0].sharing_check, responses);
156*4d7e907cSAndroid Build Coastguard Worker }
157*4d7e907cSAndroid Build Coastguard Worker 
158*4d7e907cSAndroid Build Coastguard Worker template <class F>
159*4d7e907cSAndroid Build Coastguard Worker class final_action {
160*4d7e907cSAndroid Build Coastguard Worker    public:
final_action(F f)161*4d7e907cSAndroid Build Coastguard Worker      explicit final_action(F f) : f_(std::move(f)) {}
~final_action()162*4d7e907cSAndroid Build Coastguard Worker      ~final_action() { f_(); }
163*4d7e907cSAndroid Build Coastguard Worker 
164*4d7e907cSAndroid Build Coastguard Worker    private:
165*4d7e907cSAndroid Build Coastguard Worker     F f_;
166*4d7e907cSAndroid Build Coastguard Worker };
167*4d7e907cSAndroid Build Coastguard Worker 
168*4d7e907cSAndroid Build Coastguard Worker template <class F>
finally(const F & f)169*4d7e907cSAndroid Build Coastguard Worker inline final_action<F> finally(const F& f) {
170*4d7e907cSAndroid Build Coastguard Worker     return final_action<F>(f);
171*4d7e907cSAndroid Build Coastguard Worker }
172*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(HmacKeySharingTest,ComputeSharedHmacCorruptNonce)173*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, ComputeSharedHmacCorruptNonce) {
174*4d7e907cSAndroid Build Coastguard Worker     // Important: The execution of this test gets the keymaster implementations on the device out of
175*4d7e907cSAndroid Build Coastguard Worker     // sync with respect to the HMAC key.  Granted that VTS tests aren't run on in-use production
176*4d7e907cSAndroid Build Coastguard Worker     // devices, this still has the potential to cause confusion.  To mitigate that, we always
177*4d7e907cSAndroid Build Coastguard Worker     // (barring crashes :-/) re-run the unmodified agreement process on our way out.
178*4d7e907cSAndroid Build Coastguard Worker     auto fixup_hmac = finally([&]() {
179*4d7e907cSAndroid Build Coastguard Worker         computeSharedHmac(allKeymasters(), getHmacSharingParameters(allKeymasters()));
180*4d7e907cSAndroid Build Coastguard Worker     });
181*4d7e907cSAndroid Build Coastguard Worker 
182*4d7e907cSAndroid Build Coastguard Worker     auto params = getHmacSharingParameters(allKeymasters());
183*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(allKeymasters().size(), params.size())
184*4d7e907cSAndroid Build Coastguard Worker             << "One or more keymasters failed to provide parameters.";
185*4d7e907cSAndroid Build Coastguard Worker 
186*4d7e907cSAndroid Build Coastguard Worker     // All should be well in the normal case
187*4d7e907cSAndroid Build Coastguard Worker     auto responses = computeSharedHmac(allKeymasters(), params);
188*4d7e907cSAndroid Build Coastguard Worker 
189*4d7e907cSAndroid Build Coastguard Worker     ASSERT_GT(responses.size(), 0U);
190*4d7e907cSAndroid Build Coastguard Worker     HidlBuf correct_response = responses[0].sharing_check;
191*4d7e907cSAndroid Build Coastguard Worker     verifyResponses(correct_response, responses);
192*4d7e907cSAndroid Build Coastguard Worker 
193*4d7e907cSAndroid Build Coastguard Worker     // Pick a random param, a random byte within the param's nonce, and a random bit within
194*4d7e907cSAndroid Build Coastguard Worker     // the byte.  Flip that bit.
195*4d7e907cSAndroid Build Coastguard Worker     size_t param_to_tweak = rand() % params.size();
196*4d7e907cSAndroid Build Coastguard Worker     uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce);
197*4d7e907cSAndroid Build Coastguard Worker     uint8_t bit_to_tweak = rand() % 8;
198*4d7e907cSAndroid Build Coastguard Worker     params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak);
199*4d7e907cSAndroid Build Coastguard Worker 
200*4d7e907cSAndroid Build Coastguard Worker     responses = computeSharedHmac(allKeymasters(), params);
201*4d7e907cSAndroid Build Coastguard Worker     for (size_t i = 0; i < responses.size(); ++i) {
202*4d7e907cSAndroid Build Coastguard Worker         if (i == param_to_tweak) {
203*4d7e907cSAndroid Build Coastguard Worker             EXPECT_EQ(ErrorCode::INVALID_ARGUMENT, responses[i].error)
204*4d7e907cSAndroid Build Coastguard Worker                 << "Keymaster that provided tweaked param should fail to compute HMAC key";
205*4d7e907cSAndroid Build Coastguard Worker         } else {
206*4d7e907cSAndroid Build Coastguard Worker             EXPECT_EQ(ErrorCode::OK, responses[i].error) << "Others should succeed";
207*4d7e907cSAndroid Build Coastguard Worker             EXPECT_NE(correct_response, responses[i].sharing_check)
208*4d7e907cSAndroid Build Coastguard Worker                 << "Others should calculate a different HMAC key, due to the tweaked nonce.";
209*4d7e907cSAndroid Build Coastguard Worker         }
210*4d7e907cSAndroid Build Coastguard Worker     }
211*4d7e907cSAndroid Build Coastguard Worker }
212*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(HmacKeySharingTest,ComputeSharedHmacCorruptSeed)213*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, ComputeSharedHmacCorruptSeed) {
214*4d7e907cSAndroid Build Coastguard Worker     // Important: The execution of this test gets the keymaster implementations on the device out of
215*4d7e907cSAndroid Build Coastguard Worker     // sync with respect to the HMAC key.  Granted that VTS tests aren't run on in-use production
216*4d7e907cSAndroid Build Coastguard Worker     // devices, this still has the potential to cause confusion.  To mitigate that, we always
217*4d7e907cSAndroid Build Coastguard Worker     // (barring crashes :-/) re-run the unmodified agreement process on our way out.
218*4d7e907cSAndroid Build Coastguard Worker     auto fixup_hmac = finally([&]() {
219*4d7e907cSAndroid Build Coastguard Worker         computeSharedHmac(allKeymasters(), getHmacSharingParameters(allKeymasters()));
220*4d7e907cSAndroid Build Coastguard Worker     });
221*4d7e907cSAndroid Build Coastguard Worker 
222*4d7e907cSAndroid Build Coastguard Worker     auto params = getHmacSharingParameters(allKeymasters());
223*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(allKeymasters().size(), params.size())
224*4d7e907cSAndroid Build Coastguard Worker             << "One or more keymasters failed to provide parameters.";
225*4d7e907cSAndroid Build Coastguard Worker 
226*4d7e907cSAndroid Build Coastguard Worker     // All should be well in the normal case
227*4d7e907cSAndroid Build Coastguard Worker     auto responses = computeSharedHmac(allKeymasters(), params);
228*4d7e907cSAndroid Build Coastguard Worker 
229*4d7e907cSAndroid Build Coastguard Worker     ASSERT_GT(responses.size(), 0U);
230*4d7e907cSAndroid Build Coastguard Worker     HidlBuf correct_response = responses[0].sharing_check;
231*4d7e907cSAndroid Build Coastguard Worker     verifyResponses(correct_response, responses);
232*4d7e907cSAndroid Build Coastguard Worker 
233*4d7e907cSAndroid Build Coastguard Worker     // Pick a random param and modify the seed.  We just increase the seed length by 1.  It doesn't
234*4d7e907cSAndroid Build Coastguard Worker     // matter what value is in the additional byte; it changes the seed regardless.
235*4d7e907cSAndroid Build Coastguard Worker     auto param_to_tweak = rand() % params.size();
236*4d7e907cSAndroid Build Coastguard Worker     auto& to_tweak = params[param_to_tweak].seed;
237*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(to_tweak.size() == 32 || to_tweak.size() == 0);
238*4d7e907cSAndroid Build Coastguard Worker     if (!to_tweak.size()) {
239*4d7e907cSAndroid Build Coastguard Worker         to_tweak.resize(32);  // Contents don't matter; a little randomization is nice.
240*4d7e907cSAndroid Build Coastguard Worker     }
241*4d7e907cSAndroid Build Coastguard Worker     to_tweak[0]++;
242*4d7e907cSAndroid Build Coastguard Worker 
243*4d7e907cSAndroid Build Coastguard Worker     responses = computeSharedHmac(allKeymasters(), params);
244*4d7e907cSAndroid Build Coastguard Worker     for (size_t i = 0; i < responses.size(); ++i) {
245*4d7e907cSAndroid Build Coastguard Worker         if (i == param_to_tweak) {
246*4d7e907cSAndroid Build Coastguard Worker             EXPECT_EQ(ErrorCode::INVALID_ARGUMENT, responses[i].error)
247*4d7e907cSAndroid Build Coastguard Worker                 << "Keymaster that provided tweaked param should fail to compute HMAC key ";
248*4d7e907cSAndroid Build Coastguard Worker         } else {
249*4d7e907cSAndroid Build Coastguard Worker             EXPECT_EQ(ErrorCode::OK, responses[i].error) << "Others should succeed";
250*4d7e907cSAndroid Build Coastguard Worker             EXPECT_NE(correct_response, responses[i].sharing_check)
251*4d7e907cSAndroid Build Coastguard Worker                 << "Others should calculate a different HMAC key, due to the tweaked nonce.";
252*4d7e907cSAndroid Build Coastguard Worker         }
253*4d7e907cSAndroid Build Coastguard Worker     }
254*4d7e907cSAndroid Build Coastguard Worker }
255*4d7e907cSAndroid Build Coastguard Worker 
256*4d7e907cSAndroid Build Coastguard Worker INSTANTIATE_KEYMASTER_HIDL_TEST(HmacKeySharingTest);
257*4d7e907cSAndroid Build Coastguard Worker 
258*4d7e907cSAndroid Build Coastguard Worker }  // namespace test
259*4d7e907cSAndroid Build Coastguard Worker }  // namespace V4_0
260*4d7e907cSAndroid Build Coastguard Worker }  // namespace keymaster
261*4d7e907cSAndroid Build Coastguard Worker }  // namespace hardware
262*4d7e907cSAndroid Build Coastguard Worker }  // namespace android
263