1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker * Copyright (C) 2017 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker *
4*4d7e907cSAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker *
8*4d7e907cSAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker *
10*4d7e907cSAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker */
16*4d7e907cSAndroid Build Coastguard Worker
17*4d7e907cSAndroid Build Coastguard Worker #include "KeymasterHidlTest.h"
18*4d7e907cSAndroid Build Coastguard Worker
19*4d7e907cSAndroid Build Coastguard Worker namespace android {
20*4d7e907cSAndroid Build Coastguard Worker namespace hardware {
21*4d7e907cSAndroid Build Coastguard Worker namespace keymaster {
22*4d7e907cSAndroid Build Coastguard Worker namespace V4_0 {
23*4d7e907cSAndroid Build Coastguard Worker namespace test {
24*4d7e907cSAndroid Build Coastguard Worker
25*4d7e907cSAndroid Build Coastguard Worker /**
26*4d7e907cSAndroid Build Coastguard Worker * HmacKeySharingTest extends KeymasterHidlTest with some utilities that make writing HMAC sharing
27*4d7e907cSAndroid Build Coastguard Worker * tests easier.
28*4d7e907cSAndroid Build Coastguard Worker */
29*4d7e907cSAndroid Build Coastguard Worker class HmacKeySharingTest : public KeymasterHidlTest {
30*4d7e907cSAndroid Build Coastguard Worker protected:
allKeymasters()31*4d7e907cSAndroid Build Coastguard Worker const std::vector<sp<IKeymasterDevice>>& allKeymasters() {
32*4d7e907cSAndroid Build Coastguard Worker if (all_keymasters_.empty()) {
33*4d7e907cSAndroid Build Coastguard Worker auto names = android::hardware::getAllHalInstanceNames(IKeymasterDevice::descriptor);
34*4d7e907cSAndroid Build Coastguard Worker for (const auto& name : names) {
35*4d7e907cSAndroid Build Coastguard Worker all_keymasters_.push_back(IKeymasterDevice::getService(name));
36*4d7e907cSAndroid Build Coastguard Worker }
37*4d7e907cSAndroid Build Coastguard Worker }
38*4d7e907cSAndroid Build Coastguard Worker return all_keymasters_;
39*4d7e907cSAndroid Build Coastguard Worker }
40*4d7e907cSAndroid Build Coastguard Worker
41*4d7e907cSAndroid Build Coastguard Worker struct GetParamsResult {
42*4d7e907cSAndroid Build Coastguard Worker ErrorCode error;
43*4d7e907cSAndroid Build Coastguard Worker HmacSharingParameters params;
tieandroid::hardware::keymaster::V4_0::test::HmacKeySharingTest::GetParamsResult44*4d7e907cSAndroid Build Coastguard Worker auto tie() { return std::tie(error, params); }
45*4d7e907cSAndroid Build Coastguard Worker };
46*4d7e907cSAndroid Build Coastguard Worker
47*4d7e907cSAndroid Build Coastguard Worker struct ComputeHmacResult {
48*4d7e907cSAndroid Build Coastguard Worker ErrorCode error;
49*4d7e907cSAndroid Build Coastguard Worker HidlBuf sharing_check;
tieandroid::hardware::keymaster::V4_0::test::HmacKeySharingTest::ComputeHmacResult50*4d7e907cSAndroid Build Coastguard Worker auto tie() { return std::tie(error, sharing_check); }
51*4d7e907cSAndroid Build Coastguard Worker };
52*4d7e907cSAndroid Build Coastguard Worker
53*4d7e907cSAndroid Build Coastguard Worker using KeymasterVec = std::vector<sp<IKeymasterDevice>>;
54*4d7e907cSAndroid Build Coastguard Worker using ByteString = std::vector<uint8_t>;
55*4d7e907cSAndroid Build Coastguard Worker // using NonceVec = std::vector<HidlBuf>;
56*4d7e907cSAndroid Build Coastguard Worker
getHmacSharingParameters(IKeymasterDevice & keymaster)57*4d7e907cSAndroid Build Coastguard Worker GetParamsResult getHmacSharingParameters(IKeymasterDevice& keymaster) {
58*4d7e907cSAndroid Build Coastguard Worker GetParamsResult result;
59*4d7e907cSAndroid Build Coastguard Worker EXPECT_TRUE(keymaster
60*4d7e907cSAndroid Build Coastguard Worker .getHmacSharingParameters([&](auto error, auto params) {
61*4d7e907cSAndroid Build Coastguard Worker result.tie() = std::tie(error, params);
62*4d7e907cSAndroid Build Coastguard Worker })
63*4d7e907cSAndroid Build Coastguard Worker .isOk());
64*4d7e907cSAndroid Build Coastguard Worker return result;
65*4d7e907cSAndroid Build Coastguard Worker }
66*4d7e907cSAndroid Build Coastguard Worker
getHmacSharingParameters(const KeymasterVec & keymasters)67*4d7e907cSAndroid Build Coastguard Worker hidl_vec<HmacSharingParameters> getHmacSharingParameters(const KeymasterVec& keymasters) {
68*4d7e907cSAndroid Build Coastguard Worker std::vector<HmacSharingParameters> paramsVec;
69*4d7e907cSAndroid Build Coastguard Worker for (auto& keymaster : keymasters) {
70*4d7e907cSAndroid Build Coastguard Worker auto result = getHmacSharingParameters(*keymaster);
71*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result.error);
72*4d7e907cSAndroid Build Coastguard Worker if (result.error == ErrorCode::OK) paramsVec.push_back(std::move(result.params));
73*4d7e907cSAndroid Build Coastguard Worker }
74*4d7e907cSAndroid Build Coastguard Worker return paramsVec;
75*4d7e907cSAndroid Build Coastguard Worker }
76*4d7e907cSAndroid Build Coastguard Worker
computeSharedHmac(IKeymasterDevice & keymaster,const hidl_vec<HmacSharingParameters> & params)77*4d7e907cSAndroid Build Coastguard Worker ComputeHmacResult computeSharedHmac(IKeymasterDevice& keymaster,
78*4d7e907cSAndroid Build Coastguard Worker const hidl_vec<HmacSharingParameters>& params) {
79*4d7e907cSAndroid Build Coastguard Worker ComputeHmacResult result;
80*4d7e907cSAndroid Build Coastguard Worker EXPECT_TRUE(keymaster
81*4d7e907cSAndroid Build Coastguard Worker .computeSharedHmac(params,
82*4d7e907cSAndroid Build Coastguard Worker [&](auto error, auto params) {
83*4d7e907cSAndroid Build Coastguard Worker result.tie() = std::tie(error, params);
84*4d7e907cSAndroid Build Coastguard Worker })
85*4d7e907cSAndroid Build Coastguard Worker .isOk());
86*4d7e907cSAndroid Build Coastguard Worker return result;
87*4d7e907cSAndroid Build Coastguard Worker }
88*4d7e907cSAndroid Build Coastguard Worker
computeSharedHmac(const KeymasterVec & keymasters,const hidl_vec<HmacSharingParameters> & paramsVec)89*4d7e907cSAndroid Build Coastguard Worker std::vector<ComputeHmacResult> computeSharedHmac(
90*4d7e907cSAndroid Build Coastguard Worker const KeymasterVec& keymasters, const hidl_vec<HmacSharingParameters>& paramsVec) {
91*4d7e907cSAndroid Build Coastguard Worker std::vector<ComputeHmacResult> resultVec;
92*4d7e907cSAndroid Build Coastguard Worker for (auto& keymaster : keymasters) {
93*4d7e907cSAndroid Build Coastguard Worker resultVec.push_back(computeSharedHmac(*keymaster, paramsVec));
94*4d7e907cSAndroid Build Coastguard Worker }
95*4d7e907cSAndroid Build Coastguard Worker return resultVec;
96*4d7e907cSAndroid Build Coastguard Worker }
97*4d7e907cSAndroid Build Coastguard Worker
copyNonces(const hidl_vec<HmacSharingParameters> & paramsVec)98*4d7e907cSAndroid Build Coastguard Worker std::vector<ByteString> copyNonces(const hidl_vec<HmacSharingParameters>& paramsVec) {
99*4d7e907cSAndroid Build Coastguard Worker std::vector<ByteString> nonces;
100*4d7e907cSAndroid Build Coastguard Worker for (auto& param : paramsVec) {
101*4d7e907cSAndroid Build Coastguard Worker nonces.emplace_back(param.nonce.data(), param.nonce.data() + param.nonce.size());
102*4d7e907cSAndroid Build Coastguard Worker }
103*4d7e907cSAndroid Build Coastguard Worker return nonces;
104*4d7e907cSAndroid Build Coastguard Worker }
105*4d7e907cSAndroid Build Coastguard Worker
verifyResponses(const HidlBuf & expected,const std::vector<ComputeHmacResult> & responses)106*4d7e907cSAndroid Build Coastguard Worker void verifyResponses(const HidlBuf& expected, const std::vector<ComputeHmacResult>& responses) {
107*4d7e907cSAndroid Build Coastguard Worker for (auto& response : responses) {
108*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, response.error);
109*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(expected, response.sharing_check) << "Sharing check values should match.";
110*4d7e907cSAndroid Build Coastguard Worker }
111*4d7e907cSAndroid Build Coastguard Worker }
112*4d7e907cSAndroid Build Coastguard Worker
113*4d7e907cSAndroid Build Coastguard Worker private:
114*4d7e907cSAndroid Build Coastguard Worker static std::vector<sp<IKeymasterDevice>> all_keymasters_;
115*4d7e907cSAndroid Build Coastguard Worker };
116*4d7e907cSAndroid Build Coastguard Worker
117*4d7e907cSAndroid Build Coastguard Worker std::vector<sp<IKeymasterDevice>> HmacKeySharingTest::all_keymasters_;
118*4d7e907cSAndroid Build Coastguard Worker
TEST_P(HmacKeySharingTest,GetParameters)119*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, GetParameters) {
120*4d7e907cSAndroid Build Coastguard Worker auto result1 = getHmacSharingParameters(keymaster());
121*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result1.error);
122*4d7e907cSAndroid Build Coastguard Worker
123*4d7e907cSAndroid Build Coastguard Worker auto result2 = getHmacSharingParameters(keymaster());
124*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result2.error);
125*4d7e907cSAndroid Build Coastguard Worker
126*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(result1.params.seed, result2.params.seed)
127*4d7e907cSAndroid Build Coastguard Worker << "A given keymaster should always return the same seed.";
128*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(result1.params.nonce, result2.params.nonce)
129*4d7e907cSAndroid Build Coastguard Worker << "A given keymaster should always return the same nonce until restart.";
130*4d7e907cSAndroid Build Coastguard Worker }
131*4d7e907cSAndroid Build Coastguard Worker
TEST_P(HmacKeySharingTest,ComputeSharedHmac)132*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, ComputeSharedHmac) {
133*4d7e907cSAndroid Build Coastguard Worker auto params = getHmacSharingParameters(allKeymasters());
134*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(allKeymasters().size(), params.size())
135*4d7e907cSAndroid Build Coastguard Worker << "One or more keymasters failed to provide parameters.";
136*4d7e907cSAndroid Build Coastguard Worker
137*4d7e907cSAndroid Build Coastguard Worker auto nonces = copyNonces(params);
138*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(allKeymasters().size(), nonces.size());
139*4d7e907cSAndroid Build Coastguard Worker std::sort(nonces.begin(), nonces.end());
140*4d7e907cSAndroid Build Coastguard Worker nonces.erase(std::unique(nonces.begin(), nonces.end()), nonces.end());
141*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(allKeymasters().size(), nonces.size());
142*4d7e907cSAndroid Build Coastguard Worker
143*4d7e907cSAndroid Build Coastguard Worker auto responses = computeSharedHmac(allKeymasters(), params);
144*4d7e907cSAndroid Build Coastguard Worker ASSERT_GT(responses.size(), 0U);
145*4d7e907cSAndroid Build Coastguard Worker verifyResponses(responses[0].sharing_check, responses);
146*4d7e907cSAndroid Build Coastguard Worker
147*4d7e907cSAndroid Build Coastguard Worker // Do it a second time. Should get the same answers.
148*4d7e907cSAndroid Build Coastguard Worker params = getHmacSharingParameters(allKeymasters());
149*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(allKeymasters().size(), params.size())
150*4d7e907cSAndroid Build Coastguard Worker << "One or more keymasters failed to provide parameters.";
151*4d7e907cSAndroid Build Coastguard Worker
152*4d7e907cSAndroid Build Coastguard Worker responses = computeSharedHmac(allKeymasters(), params);
153*4d7e907cSAndroid Build Coastguard Worker ASSERT_GT(responses.size(), 0U);
154*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(32U, responses[0].sharing_check.size());
155*4d7e907cSAndroid Build Coastguard Worker verifyResponses(responses[0].sharing_check, responses);
156*4d7e907cSAndroid Build Coastguard Worker }
157*4d7e907cSAndroid Build Coastguard Worker
158*4d7e907cSAndroid Build Coastguard Worker template <class F>
159*4d7e907cSAndroid Build Coastguard Worker class final_action {
160*4d7e907cSAndroid Build Coastguard Worker public:
final_action(F f)161*4d7e907cSAndroid Build Coastguard Worker explicit final_action(F f) : f_(std::move(f)) {}
~final_action()162*4d7e907cSAndroid Build Coastguard Worker ~final_action() { f_(); }
163*4d7e907cSAndroid Build Coastguard Worker
164*4d7e907cSAndroid Build Coastguard Worker private:
165*4d7e907cSAndroid Build Coastguard Worker F f_;
166*4d7e907cSAndroid Build Coastguard Worker };
167*4d7e907cSAndroid Build Coastguard Worker
168*4d7e907cSAndroid Build Coastguard Worker template <class F>
finally(const F & f)169*4d7e907cSAndroid Build Coastguard Worker inline final_action<F> finally(const F& f) {
170*4d7e907cSAndroid Build Coastguard Worker return final_action<F>(f);
171*4d7e907cSAndroid Build Coastguard Worker }
172*4d7e907cSAndroid Build Coastguard Worker
TEST_P(HmacKeySharingTest,ComputeSharedHmacCorruptNonce)173*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, ComputeSharedHmacCorruptNonce) {
174*4d7e907cSAndroid Build Coastguard Worker // Important: The execution of this test gets the keymaster implementations on the device out of
175*4d7e907cSAndroid Build Coastguard Worker // sync with respect to the HMAC key. Granted that VTS tests aren't run on in-use production
176*4d7e907cSAndroid Build Coastguard Worker // devices, this still has the potential to cause confusion. To mitigate that, we always
177*4d7e907cSAndroid Build Coastguard Worker // (barring crashes :-/) re-run the unmodified agreement process on our way out.
178*4d7e907cSAndroid Build Coastguard Worker auto fixup_hmac = finally([&]() {
179*4d7e907cSAndroid Build Coastguard Worker computeSharedHmac(allKeymasters(), getHmacSharingParameters(allKeymasters()));
180*4d7e907cSAndroid Build Coastguard Worker });
181*4d7e907cSAndroid Build Coastguard Worker
182*4d7e907cSAndroid Build Coastguard Worker auto params = getHmacSharingParameters(allKeymasters());
183*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(allKeymasters().size(), params.size())
184*4d7e907cSAndroid Build Coastguard Worker << "One or more keymasters failed to provide parameters.";
185*4d7e907cSAndroid Build Coastguard Worker
186*4d7e907cSAndroid Build Coastguard Worker // All should be well in the normal case
187*4d7e907cSAndroid Build Coastguard Worker auto responses = computeSharedHmac(allKeymasters(), params);
188*4d7e907cSAndroid Build Coastguard Worker
189*4d7e907cSAndroid Build Coastguard Worker ASSERT_GT(responses.size(), 0U);
190*4d7e907cSAndroid Build Coastguard Worker HidlBuf correct_response = responses[0].sharing_check;
191*4d7e907cSAndroid Build Coastguard Worker verifyResponses(correct_response, responses);
192*4d7e907cSAndroid Build Coastguard Worker
193*4d7e907cSAndroid Build Coastguard Worker // Pick a random param, a random byte within the param's nonce, and a random bit within
194*4d7e907cSAndroid Build Coastguard Worker // the byte. Flip that bit.
195*4d7e907cSAndroid Build Coastguard Worker size_t param_to_tweak = rand() % params.size();
196*4d7e907cSAndroid Build Coastguard Worker uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce);
197*4d7e907cSAndroid Build Coastguard Worker uint8_t bit_to_tweak = rand() % 8;
198*4d7e907cSAndroid Build Coastguard Worker params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak);
199*4d7e907cSAndroid Build Coastguard Worker
200*4d7e907cSAndroid Build Coastguard Worker responses = computeSharedHmac(allKeymasters(), params);
201*4d7e907cSAndroid Build Coastguard Worker for (size_t i = 0; i < responses.size(); ++i) {
202*4d7e907cSAndroid Build Coastguard Worker if (i == param_to_tweak) {
203*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::INVALID_ARGUMENT, responses[i].error)
204*4d7e907cSAndroid Build Coastguard Worker << "Keymaster that provided tweaked param should fail to compute HMAC key";
205*4d7e907cSAndroid Build Coastguard Worker } else {
206*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, responses[i].error) << "Others should succeed";
207*4d7e907cSAndroid Build Coastguard Worker EXPECT_NE(correct_response, responses[i].sharing_check)
208*4d7e907cSAndroid Build Coastguard Worker << "Others should calculate a different HMAC key, due to the tweaked nonce.";
209*4d7e907cSAndroid Build Coastguard Worker }
210*4d7e907cSAndroid Build Coastguard Worker }
211*4d7e907cSAndroid Build Coastguard Worker }
212*4d7e907cSAndroid Build Coastguard Worker
TEST_P(HmacKeySharingTest,ComputeSharedHmacCorruptSeed)213*4d7e907cSAndroid Build Coastguard Worker TEST_P(HmacKeySharingTest, ComputeSharedHmacCorruptSeed) {
214*4d7e907cSAndroid Build Coastguard Worker // Important: The execution of this test gets the keymaster implementations on the device out of
215*4d7e907cSAndroid Build Coastguard Worker // sync with respect to the HMAC key. Granted that VTS tests aren't run on in-use production
216*4d7e907cSAndroid Build Coastguard Worker // devices, this still has the potential to cause confusion. To mitigate that, we always
217*4d7e907cSAndroid Build Coastguard Worker // (barring crashes :-/) re-run the unmodified agreement process on our way out.
218*4d7e907cSAndroid Build Coastguard Worker auto fixup_hmac = finally([&]() {
219*4d7e907cSAndroid Build Coastguard Worker computeSharedHmac(allKeymasters(), getHmacSharingParameters(allKeymasters()));
220*4d7e907cSAndroid Build Coastguard Worker });
221*4d7e907cSAndroid Build Coastguard Worker
222*4d7e907cSAndroid Build Coastguard Worker auto params = getHmacSharingParameters(allKeymasters());
223*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(allKeymasters().size(), params.size())
224*4d7e907cSAndroid Build Coastguard Worker << "One or more keymasters failed to provide parameters.";
225*4d7e907cSAndroid Build Coastguard Worker
226*4d7e907cSAndroid Build Coastguard Worker // All should be well in the normal case
227*4d7e907cSAndroid Build Coastguard Worker auto responses = computeSharedHmac(allKeymasters(), params);
228*4d7e907cSAndroid Build Coastguard Worker
229*4d7e907cSAndroid Build Coastguard Worker ASSERT_GT(responses.size(), 0U);
230*4d7e907cSAndroid Build Coastguard Worker HidlBuf correct_response = responses[0].sharing_check;
231*4d7e907cSAndroid Build Coastguard Worker verifyResponses(correct_response, responses);
232*4d7e907cSAndroid Build Coastguard Worker
233*4d7e907cSAndroid Build Coastguard Worker // Pick a random param and modify the seed. We just increase the seed length by 1. It doesn't
234*4d7e907cSAndroid Build Coastguard Worker // matter what value is in the additional byte; it changes the seed regardless.
235*4d7e907cSAndroid Build Coastguard Worker auto param_to_tweak = rand() % params.size();
236*4d7e907cSAndroid Build Coastguard Worker auto& to_tweak = params[param_to_tweak].seed;
237*4d7e907cSAndroid Build Coastguard Worker ASSERT_TRUE(to_tweak.size() == 32 || to_tweak.size() == 0);
238*4d7e907cSAndroid Build Coastguard Worker if (!to_tweak.size()) {
239*4d7e907cSAndroid Build Coastguard Worker to_tweak.resize(32); // Contents don't matter; a little randomization is nice.
240*4d7e907cSAndroid Build Coastguard Worker }
241*4d7e907cSAndroid Build Coastguard Worker to_tweak[0]++;
242*4d7e907cSAndroid Build Coastguard Worker
243*4d7e907cSAndroid Build Coastguard Worker responses = computeSharedHmac(allKeymasters(), params);
244*4d7e907cSAndroid Build Coastguard Worker for (size_t i = 0; i < responses.size(); ++i) {
245*4d7e907cSAndroid Build Coastguard Worker if (i == param_to_tweak) {
246*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::INVALID_ARGUMENT, responses[i].error)
247*4d7e907cSAndroid Build Coastguard Worker << "Keymaster that provided tweaked param should fail to compute HMAC key ";
248*4d7e907cSAndroid Build Coastguard Worker } else {
249*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, responses[i].error) << "Others should succeed";
250*4d7e907cSAndroid Build Coastguard Worker EXPECT_NE(correct_response, responses[i].sharing_check)
251*4d7e907cSAndroid Build Coastguard Worker << "Others should calculate a different HMAC key, due to the tweaked nonce.";
252*4d7e907cSAndroid Build Coastguard Worker }
253*4d7e907cSAndroid Build Coastguard Worker }
254*4d7e907cSAndroid Build Coastguard Worker }
255*4d7e907cSAndroid Build Coastguard Worker
256*4d7e907cSAndroid Build Coastguard Worker INSTANTIATE_KEYMASTER_HIDL_TEST(HmacKeySharingTest);
257*4d7e907cSAndroid Build Coastguard Worker
258*4d7e907cSAndroid Build Coastguard Worker } // namespace test
259*4d7e907cSAndroid Build Coastguard Worker } // namespace V4_0
260*4d7e907cSAndroid Build Coastguard Worker } // namespace keymaster
261*4d7e907cSAndroid Build Coastguard Worker } // namespace hardware
262*4d7e907cSAndroid Build Coastguard Worker } // namespace android
263