blob: a5d17bbd2ed923ee072431b3ab08777af53233e3 [file] [log] [blame]
// Copyright lowRISC contributors.
// Licensed under the Apache License, Version 2.0, see LICENSE for details.
// SPDX-License-Identifier: Apache-2.0
#include "sw/device/lib/base/memory.h"
#include "sw/device/lib/base/mmio.h"
#include "sw/device/lib/dif/dif_base.h"
#include "sw/device/lib/dif/dif_entropy_src.h"
#include "sw/device/lib/runtime/log.h"
#include "sw/device/lib/testing/test_framework/check.h"
#include "sw/device/lib/testing/test_framework/ottf_main.h"
#include "hw/top_earlgrey/sw/autogen/top_earlgrey.h" // Generated.
#define KAT_TEST_TIMEOUT_ATTEMPTS 256
OTTF_DEFINE_TEST_CONFIG();
enum {
/**
* The size of the buffer used in firmware to process the entropy bits in
* firmware override mode.
*/
kEntropyFifoBufferSize = 12,
};
/**
* Configures the entropy source module in firmware override mode.
*
* Output is routed to firmware, and the fw_override mode is enabled to get data
* post-health tests and before the pre conditioner block.
*
* @param entropy An entropy source instance.
*/
static void entropy_with_fw_override_enable(dif_entropy_src_t *entropy_src) {
const dif_entropy_src_fw_override_config_t fw_override_config = {
.entropy_insert_enable = true,
.buffer_threshold = kEntropyFifoBufferSize,
};
CHECK_DIF_OK(dif_entropy_src_fw_override_configure(
entropy_src, fw_override_config, kDifToggleEnabled));
const dif_entropy_src_config_t config = {
.fips_enable = true,
.route_to_firmware = true,
.single_bit_mode = kDifEntropySrcSingleBitModeDisabled,
.health_test_threshold_scope = false, /*default*/
.health_test_window_size = 0x0200, /*default*/
.alert_threshold = 2, /*default*/
};
CHECK_DIF_OK(
dif_entropy_src_configure(entropy_src, config, kDifToggleEnabled));
}
/**
* Cleanly disables the SHA3 conditioner while in SHA3 mode, prompting
* the release of a conditioned seed.
*
* If stopping the conditioner fails, due to pending data keep trying for
* at most KAT_TEST_TIMEOUT_ATTEMPTS.
*
* @param entropy An entropy source instance.
*/
static void stop_sha3_conditioner(dif_entropy_src_t *entropy_src) {
uint32_t fail_count = 0;
dif_result_t op_result;
do {
op_result = dif_entropy_src_conditioner_stop(entropy_src);
if (op_result == kDifIpFifoFull) {
fail_count++;
CHECK(fail_count < KAT_TEST_TIMEOUT_ATTEMPTS);
} else {
CHECK_DIF_OK(op_result);
}
} while (op_result == kDifIpFifoFull);
}
/**
* Flushes any previously absorbed entropy from the SHA3 conditioning block.
*
* @param entropy An entropy source instance.
*/
static void flush_sha3_conditioner(dif_entropy_src_t *entropy_src) {
// Start and stop the conditioner, without adding any new entropy.
CHECK_DIF_OK(dif_entropy_src_conditioner_start(entropy_src));
stop_sha3_conditioner(entropy_src);
// Read (and discard) the resulting seed.
uint32_t got[kEntropyFifoBufferSize];
for (size_t i = 0; i < ARRAYSIZE(got); ++i) {
CHECK_DIF_OK(dif_entropy_src_non_blocking_read(entropy_src, &got[i]));
}
}
/**
* Runs known answer test for the entropy_src SHA-3 conditioner.
*
* This test uses the following SHA3 CAVP test vector:
*
* Msg=a90d2aa5b241e1ca9dab5b6dc05c3e2c93fc5a2210a6315d60f9b791b36b560d70e135ef8e7dba9441b74e53dab0606b
* MD=4a16881ce156f45fdfdb45088e3f23be1b4c5a7a6a35315d36c51c75f275733319aca185d4ab33130ffe45f751f1bbc5
*
* See:
* https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/secure-hashing
*/
void test_sha384_kat(dif_entropy_src_t *entropy_src) {
CHECK_DIF_OK(dif_entropy_src_set_enabled(entropy_src, kDifToggleDisabled));
entropy_with_fw_override_enable(entropy_src);
// Though most of the entropy_src state is cleared on disable, the
// SHA3 conditioner accumulates entropy even from aborted seeds. For
// the KAT though, we must clear any previously absorbed entropy.
flush_sha3_conditioner(entropy_src);
const uint32_t kInputMsg[kEntropyFifoBufferSize] = {
0xa52a0da9, 0xcae141b2, 0x6d5bab9d, 0x2c3e5cc0, 0x225afc93, 0x5d31a610,
0x91b7f960, 0x0d566bb3, 0xef35e170, 0x94ba7d8e, 0x534eb741, 0x6b60b0da,
};
CHECK_DIF_OK(dif_entropy_src_conditioner_start(entropy_src));
dif_result_t op_result;
uint32_t fail_count = 0;
uint32_t count;
uint32_t total = 0;
// Load the input data.
do {
op_result = dif_entropy_src_observe_fifo_write(
entropy_src, kInputMsg + total, ARRAYSIZE(kInputMsg) - total, &count);
total += count;
if (op_result == kDifIpFifoFull) {
fail_count++;
CHECK(fail_count < KAT_TEST_TIMEOUT_ATTEMPTS);
} else {
fail_count = 0;
CHECK_DIF_OK(op_result);
}
} while (total < ARRAYSIZE(kInputMsg));
// Cleanly disable the conditioner.
stop_sha3_conditioner(entropy_src);
uint32_t got[kEntropyFifoBufferSize];
for (size_t i = 0; i < ARRAYSIZE(got); ++i) {
CHECK_DIF_OK(dif_entropy_src_non_blocking_read(entropy_src, &got[i]));
}
const uint32_t kExpectedDigest[kEntropyFifoBufferSize] = {
0x1c88164a, 0x5ff456e1, 0x0845dbdf, 0xbe233f8e, 0x7a5a4c1b, 0x5d31356a,
0x751cc536, 0x337375f2, 0x85a1ac19, 0x1333abd4, 0xf745fe0f, 0xc5bbf151,
};
CHECK_ARRAYS_EQ(got, kExpectedDigest, kEntropyFifoBufferSize,
"Unexpected digest value.");
}
bool test_main(void) {
dif_entropy_src_t entropy_src;
CHECK_DIF_OK(dif_entropy_src_init(
mmio_region_from_addr(TOP_EARLGREY_ENTROPY_SRC_BASE_ADDR), &entropy_src));
test_sha384_kat(&entropy_src);
return true;
}