| // Copyright lowRISC contributors. | 
 | // Licensed under the Apache License, Version 2.0, see LICENSE for details. | 
 | // SPDX-License-Identifier: Apache-2.0 | 
 |  | 
 | #include <stdbool.h> | 
 | #include <stdint.h> | 
 |  | 
 | #include "sw/device/lib/arch/device.h" | 
 | #include "sw/device/lib/base/macros.h" | 
 | #include "sw/device/lib/dif/dif_keymgr.h" | 
 | #include "sw/device/lib/dif/dif_kmac.h" | 
 | #include "sw/device/lib/runtime/hart.h" | 
 | #include "sw/device/lib/runtime/log.h" | 
 | #include "sw/device/lib/runtime/print.h" | 
 | #include "sw/device/lib/testing/keymgr_testutils.h" | 
 | #include "sw/device/lib/testing/kmac_testutils.h" | 
 | #include "sw/device/lib/testing/test_framework/check.h" | 
 | #include "sw/device/lib/testing/test_framework/ottf_main.h" | 
 |  | 
 | #include "hw/top_earlgrey/sw/autogen/top_earlgrey.h" | 
 | #include "keymgr_regs.h"  // Generated. | 
 | #include "kmac_regs.h"    // Generated. | 
 |  | 
 | // The KMAC dif expects a secret key, even though if the configuration is set | 
 | // to use the sideloaded key then it will be ignored. We will write a software | 
 | // key and then ensure that the output does NOT match the expected value for | 
 | // this key when sideloading is used. | 
 | // | 
 | // Test taken from sample #1 here: | 
 | // https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Standards-and-Guidelines/documents/examples/KMAC_samples.pdf | 
 | static const dif_kmac_key_t kSoftwareKey = { | 
 |     .share0 = {0x43424140, 0x47464544, 0x4B4A4948, 0x4F4E4D4C, 0x53525150, | 
 |                0x57565554, 0x5B5A5958, 0x5F5E5D5C}, | 
 |     .share1 = {0}, | 
 |     .length = kDifKmacKeyLen256, | 
 | }; | 
 | static const dif_kmac_mode_kmac_t kKmacMode = kDifKmacModeKmacLen128; | 
 | static const size_t kKmacOutputLen = 8; | 
 | static const uint32_t kSoftwareKeyExpectedOutput[8] = { | 
 |     0x0D0B78E5, 0xD3F7A63E, 0x70C529A4, 0x003AA46A, | 
 |     0xD4D7DBFA, 0x9E832896, 0x3F248731, 0x4EE16E45}; | 
 | static const char *kCustomString = NULL; | 
 | static const size_t kCustomStringLen = 0; | 
 | static const char kKmacMessage[] = "\x00\x01\x02\x03"; | 
 | static const size_t kKmacMessageLen = 4; | 
 |  | 
 | // This is computed and filled by dv side | 
 | static volatile const uint8_t sideload_digest_result[32] = {0}; | 
 |  | 
 | OTTF_DEFINE_TEST_CONFIG(); | 
 |  | 
 | /** | 
 |  * Initialize and run KMAC using a sideloaded key. | 
 |  * | 
 |  * First, checks that KMAC works with the software key. Next, checks that when | 
 |  * sideload=true, KMAC produces a different result. | 
 |  */ | 
 | static void test_kmac_with_sideloaded_key(dif_keymgr_t *keymgr, | 
 |                                           dif_kmac_t *kmac) { | 
 |   // Configure KMAC hardware (using software key and software entropy). | 
 |   kmac_testutils_config(kmac, false); | 
 |  | 
 |   uint32_t output[kKmacOutputLen]; | 
 |   kmac_testutils_kmac(kmac, kKmacMode, &kSoftwareKey, kCustomString, | 
 |                       kCustomStringLen, kKmacMessage, kKmacMessageLen, | 
 |                       kKmacOutputLen, output); | 
 |   LOG_INFO("Computed KMAC output for software key."); | 
 |  | 
 |   // Check that the output matches the expected output. | 
 |   CHECK_ARRAYS_EQ(output, kSoftwareKeyExpectedOutput, kKmacOutputLen); | 
 |  | 
 |   // Reconfigure KMAC to use the sideloaded key. | 
 |   kmac_testutils_config(kmac, true); | 
 |  | 
 |   // Generate the sideloaded key. | 
 |   dif_keymgr_versioned_key_params_t sideload_params = kKeyVersionedParams; | 
 |   sideload_params.dest = kDifKeymgrVersionedKeyDestKmac; | 
 |   keymgr_testutils_generate_versioned_key(keymgr, sideload_params); | 
 |   LOG_INFO("Keymgr generated HW output for Kmac at OwnerIntKey State"); | 
 |  | 
 |   kmac_testutils_kmac(kmac, kKmacMode, &kSoftwareKey, kCustomString, | 
 |                       kCustomStringLen, kKmacMessage, kKmacMessageLen, | 
 |                       kKmacOutputLen, output); | 
 |   LOG_INFO("Computed KMAC output for sideloaded key."); | 
 |  | 
 |   if (kDeviceType == kDeviceSimDV) { | 
 |     CHECK_ARRAYS_EQ(output, (uint32_t *)sideload_digest_result, kKmacOutputLen); | 
 |   } | 
 |  | 
 |   LOG_INFO("Clearing the sideloaded key."); | 
 |  | 
 |   // Enable "clear the key" toggle, so that previous sideload key port is | 
 |   // cleared. | 
 |   CHECK_DIF_OK( | 
 |       dif_keymgr_sideload_clear_set_enabled(keymgr, kDifToggleEnabled)); | 
 |  | 
 |   // Disable "clear the key" toggle, so that the sideload key port is stable. | 
 |   // Otherwise, the sideload port is continuously overwritten by fresh | 
 |   // randomness every clock cycle. | 
 |   CHECK_DIF_OK( | 
 |       dif_keymgr_sideload_clear_set_enabled(keymgr, kDifToggleDisabled)); | 
 |  | 
 |   kmac_testutils_kmac(kmac, kKmacMode, &kSoftwareKey, kCustomString, | 
 |                       kCustomStringLen, kKmacMessage, kKmacMessageLen, | 
 |                       kKmacOutputLen, output); | 
 |   LOG_INFO("Computed KMAC output for software key (for inequality check.)"); | 
 |  | 
 |   // Verify that KMAC output is not equal to the one the from the sideload. | 
 |   CHECK_ARRAYS_NE(output, (uint32_t *)sideload_digest_result, kKmacOutputLen); | 
 |  | 
 |   // Sideload the same KMAC key again and check if we can compute the same | 
 |   // result as before. | 
 |   keymgr_testutils_generate_versioned_key(keymgr, sideload_params); | 
 |   LOG_INFO("Keymgr regenerated HW output for Kmac at OwnerIntKey State"); | 
 |  | 
 |   kmac_testutils_kmac(kmac, kKmacMode, &kSoftwareKey, kCustomString, | 
 |                       kCustomStringLen, kKmacMessage, kKmacMessageLen, | 
 |                       kKmacOutputLen, output); | 
 |   LOG_INFO("Re-computed KMAC output for sideloaded key."); | 
 |  | 
 |   if (kDeviceType == kDeviceSimDV) { | 
 |     CHECK_ARRAYS_EQ(output, (uint32_t *)sideload_digest_result, kKmacOutputLen); | 
 |   } | 
 | } | 
 |  | 
 | bool test_main(void) { | 
 |   // Initialize keymgr and advance to CreatorRootKey state. | 
 |   dif_keymgr_t keymgr; | 
 |   dif_kmac_t kmac; | 
 |   keymgr_testutils_startup(&keymgr, &kmac); | 
 |  | 
 |   // Advance to OwnerIntKey state. | 
 |   keymgr_testutils_advance_state(&keymgr, &kOwnerIntParams); | 
 |   keymgr_testutils_check_state(&keymgr, kDifKeymgrStateOwnerIntermediateKey); | 
 |   LOG_INFO("Keymgr entered OwnerIntKey State"); | 
 |  | 
 |   // Test KMAC sideloading. | 
 |   test_kmac_with_sideloaded_key(&keymgr, &kmac); | 
 |  | 
 |   return true; | 
 | } |