| // Copyright lowRISC contributors. |
| // Licensed under the Apache License, Version 2.0, see LICENSE for details. |
| // SPDX-License-Identifier: Apache-2.0 |
| |
| #include "sw/device/lib/base/macros.h" |
| #include "sw/device/lib/base/mmio.h" |
| #include "sw/device/lib/dif/dif_csrng.h" |
| #include "sw/device/lib/runtime/log.h" |
| #include "sw/device/lib/testing/check.h" |
| #include "sw/device/lib/testing/test_framework/test_main.h" |
| |
| #include "hw/top_earlgrey/sw/autogen/top_earlgrey.h" |
| |
| const test_config_t kTestConfig; |
| |
| enum { |
| kExpectedOutputLen = 16, |
| }; |
| |
| /** |
| * Wait for the `csrng` instance command interface to be ready to accept |
| * commands. Aborts test execution if an error is found. |
| */ |
| static void wait_for_csrng_cmd_ready(const dif_csrng_t *csrng) { |
| dif_csrng_cmd_status_t cmd_status; |
| do { |
| CHECK_DIF_OK(dif_csrng_get_cmd_interface_status(csrng, &cmd_status)); |
| CHECK(cmd_status != kDifCsrngCmdStatusError); |
| } while (cmd_status != kDifCsrngCmdStatusReady); |
| } |
| |
| /** |
| * Checks the CSRNG internal state against `expected` values. |
| * |
| * @param csrng A CSRNG handle. |
| * @param expected Expected CSRNG internal state. |
| */ |
| static void check_internal_state(const dif_csrng_t *csrng, |
| const dif_csrng_internal_state_t *expected) { |
| wait_for_csrng_cmd_ready(csrng); |
| dif_csrng_internal_state_t got; |
| CHECK_DIF_OK( |
| dif_csrng_get_internal_state(csrng, kCsrngInternalStateIdSw, &got)); |
| |
| CHECK(got.instantiated == expected->instantiated); |
| CHECK(got.reseed_counter == expected->reseed_counter); |
| CHECK(got.fips_compliance == expected->fips_compliance); |
| |
| CHECK_BUFFER(got.v, expected->v, ARRAYSIZE(expected->v), |
| "CSRNG internal V buffer mismatch."); |
| |
| CHECK_BUFFER(got.key, expected->key, ARRAYSIZE(expected->key), |
| "CSRNG internal K buffer mismatch."); |
| } |
| |
| /** |
| * CTR DRBG Known-Answer-Test (KAT) for INSTANTIATE command. |
| */ |
| static void fips_instantiate_kat(const dif_csrng_t *csrng) { |
| LOG_INFO("Instantiate KAT"); |
| |
| const dif_csrng_seed_material_t kEntropyInput = { |
| .seed_material = {0x73bec010, 0x9262474c, 0x16a30f76, 0x531b51de, |
| 0x2ee494e5, 0xdfec9db3, 0xcb7a879d, 0x5600419c, |
| 0xca79b0b0, 0xdda33b5c, 0xa468649e, 0xdf5d73fa}, |
| .seed_material_len = 12, |
| }; |
| wait_for_csrng_cmd_ready(csrng); |
| CHECK_DIF_OK(dif_csrng_instantiate(csrng, kDifCsrngEntropySrcToggleDisable, |
| &kEntropyInput)); |
| |
| const dif_csrng_internal_state_t kExpectedState = { |
| .reseed_counter = 1, |
| .v = {0x06b8f59e, 0x43c0b2c2, 0x21052502, 0x217b5214}, |
| .key = {0x941709fd, 0xd8a25860, 0x861aecf3, 0x98a701a1, 0x0eb2c33b, |
| 0x74c08fad, 0x632d5227, 0x8c52f901}, |
| .instantiated = true, |
| .fips_compliance = false, |
| }; |
| check_internal_state(csrng, &kExpectedState); |
| } |
| |
| /** |
| * Runs CSRNG generate command. |
| * |
| * @param csrng A CSRNG handle. |
| * @param output Output buffer. |
| * @param output_len Number of words of entropy to write to output buffer. |
| */ |
| static void run_generate_cmd(const dif_csrng_t *csrng, uint32_t *output, |
| size_t output_len) { |
| wait_for_csrng_cmd_ready(csrng); |
| CHECK_DIF_OK(dif_csrng_generate_start(csrng, output_len)); |
| |
| dif_csrng_output_status_t output_status; |
| do { |
| CHECK_DIF_OK(dif_csrng_get_output_status(csrng, &output_status)); |
| } while (!output_status.valid_data); |
| |
| CHECK_DIF_OK(dif_csrng_generate_end(csrng, output, output_len)); |
| } |
| |
| /** |
| * CTR DRBG Known-Answer-Test (KAT) for GENERATE command. |
| */ |
| static void fips_generate_kat(const dif_csrng_t *csrng) { |
| LOG_INFO("Generate KAT"); |
| |
| uint32_t got[kExpectedOutputLen]; |
| run_generate_cmd(csrng, got, kExpectedOutputLen); |
| run_generate_cmd(csrng, got, kExpectedOutputLen); |
| const dif_csrng_internal_state_t kExpectedState = { |
| .reseed_counter = 3, |
| .v = {0xe73e3392, 0x7d2e92b1, 0x1a0bac9d, 0x53c78ac6}, |
| .key = {0x66d1b85a, 0xc19d4dfd, 0x053b73e3, 0xe9dc0f90, 0x3f015bc8, |
| 0x4436e5fd, 0x1cccc697, 0x1a1c6e5f}, |
| .instantiated = true, |
| .fips_compliance = false, |
| }; |
| check_internal_state(csrng, &kExpectedState); |
| |
| const uint32_t kExpectedOutput[kExpectedOutputLen] = { |
| 0x793e01c5, 0x87b107ae, 0xdb17514c, 0xa43c41b7, 0x510494b3, 0x64f7ac0c, |
| 0x2581f391, 0x80b1dc2f, 0xdf82ab22, 0x771c619b, 0xd40fccb1, 0x87189e99, |
| 0xe48bb8cb, 0x1012c84c, 0x5af8a7f1, 0xd1c07cd9}; |
| |
| CHECK_BUFFER(got, kExpectedOutput, kExpectedOutputLen, |
| "Generate command KAT output mismatch"); |
| } |
| |
| /** |
| * Run CTR DRBG Known-Answer-Tests (KATs). |
| */ |
| void test_ctr_drbg_ctr0(const dif_csrng_t *csrng) { |
| CHECK_DIF_OK(dif_csrng_uninstantiate(csrng)); |
| fips_instantiate_kat(csrng); |
| fips_generate_kat(csrng); |
| } |
| |
| bool test_main() { |
| dif_csrng_t csrng; |
| CHECK_DIF_OK(dif_csrng_init( |
| mmio_region_from_addr(TOP_EARLGREY_CSRNG_BASE_ADDR), &csrng)); |
| CHECK_DIF_OK(dif_csrng_configure(&csrng)); |
| |
| test_ctr_drbg_ctr0(&csrng); |
| |
| return true; |
| } |