| // Copyright lowRISC contributors. | 
 | // Licensed under the Apache License, Version 2.0, see LICENSE for details. | 
 | // SPDX-License-Identifier: Apache-2.0 | 
 |  | 
 | #include "sw/device/lib/testing/keymgr_testutils.h" | 
 |  | 
 | #include "sw/device/lib/dif/dif_flash_ctrl.h" | 
 | #include "sw/device/lib/dif/dif_keymgr.h" | 
 | #include "sw/device/lib/dif/dif_kmac.h" | 
 | #include "sw/device/lib/dif/dif_otp_ctrl.h" | 
 | #include "sw/device/lib/dif/dif_rstmgr.h" | 
 | #include "sw/device/lib/runtime/ibex.h" | 
 | #include "sw/device/lib/runtime/log.h" | 
 | #include "sw/device/lib/testing/flash_ctrl_testutils.h" | 
 | #include "sw/device/lib/testing/kmac_testutils.h" | 
 | #include "sw/device/lib/testing/otp_ctrl_testutils.h" | 
 | #include "sw/device/lib/testing/rstmgr_testutils.h" | 
 | #include "sw/device/lib/testing/test_framework/check.h" | 
 | #include "sw/device/silicon_creator/lib/base/chip.h" | 
 | #include "sw/device/silicon_creator/lib/drivers/retention_sram.h" | 
 |  | 
 | #include "hw/top_earlgrey/sw/autogen/top_earlgrey.h" | 
 |  | 
 | enum { | 
 |   /** Flash Secret partition ID. */ | 
 |   kFlashInfoPartitionId = 0, | 
 |  | 
 |   /** Secret partition flash bank ID. */ | 
 |   kFlashInfoBankId = 0, | 
 |  | 
 |   /** Creator Secret flash info page ID. */ | 
 |   kFlashInfoPageIdCreatorSecret = 1, | 
 |  | 
 |   /** Owner Secret flash info page ID. */ | 
 |   kFlashInfoPageIdOwnerSecret = 2, | 
 | }; | 
 |  | 
 | static void write_info_page(dif_flash_ctrl_state_t *flash, uint32_t page_id, | 
 |                             const keymgr_testutils_secret_t *data, | 
 |                             bool scramble) { | 
 |   uint32_t address; | 
 |   if (scramble) { | 
 |     address = flash_ctrl_testutils_info_region_scrambled_setup( | 
 |         flash, page_id, kFlashInfoBankId, kFlashInfoPartitionId); | 
 |   } else { | 
 |     address = flash_ctrl_testutils_info_region_setup( | 
 |         flash, page_id, kFlashInfoBankId, kFlashInfoPartitionId); | 
 |   } | 
 |  | 
 |   CHECK(flash_ctrl_testutils_erase_and_write_page( | 
 |       flash, address, kFlashInfoPartitionId, data->value, | 
 |       kDifFlashCtrlPartitionTypeInfo, ARRAYSIZE(data->value))); | 
 |  | 
 |   keymgr_testutils_secret_t readback_data; | 
 |   CHECK(flash_ctrl_testutils_read( | 
 |       flash, address, kFlashInfoPartitionId, readback_data.value, | 
 |       kDifFlashCtrlPartitionTypeInfo, ARRAYSIZE(readback_data.value), 0)); | 
 |   CHECK_ARRAYS_EQ(data->value, readback_data.value, ARRAYSIZE(data->value)); | 
 | } | 
 |  | 
 | void keymgr_testutils_flash_init( | 
 |     dif_flash_ctrl_state_t *flash, | 
 |     const keymgr_testutils_secret_t *creator_secret, | 
 |     const keymgr_testutils_secret_t *owner_secret) { | 
 |   // Initialize flash secrets. | 
 |   write_info_page(flash, kFlashInfoPageIdCreatorSecret, creator_secret, | 
 |                   /*scramble=*/true); | 
 |   write_info_page(flash, kFlashInfoPageIdOwnerSecret, owner_secret, | 
 |                   /*scramble=*/true); | 
 | } | 
 |  | 
 | void keymgr_testutils_startup(dif_keymgr_t *keymgr, dif_kmac_t *kmac) { | 
 |   dif_flash_ctrl_state_t flash; | 
 |   dif_rstmgr_t rstmgr; | 
 |   dif_rstmgr_reset_info_bitfield_t info; | 
 |  | 
 |   CHECK_DIF_OK(dif_rstmgr_init( | 
 |       mmio_region_from_addr(TOP_EARLGREY_RSTMGR_AON_BASE_ADDR), &rstmgr)); | 
 |   info = rstmgr_testutils_reason_get(); | 
 |  | 
 |   // Check the last word of the retention SRAM creator area to determine the | 
 |   // type of the ROM. | 
 |   bool is_using_test_rom = | 
 |       retention_sram_get() | 
 |           ->reserved_creator[ARRAYSIZE((retention_sram_t){0}.reserved_creator) - | 
 |                              1] == TEST_ROM_IDENTIFIER; | 
 |  | 
 |   // POR reset. | 
 |   if (info == kDifRstmgrResetInfoPor) { | 
 |     LOG_INFO("Powered up for the first time, program flash"); | 
 |  | 
 |     CHECK_DIF_OK(dif_flash_ctrl_init_state( | 
 |         &flash, mmio_region_from_addr(TOP_EARLGREY_FLASH_CTRL_CORE_BASE_ADDR))); | 
 |  | 
 |     keymgr_testutils_flash_init(&flash, &kCreatorSecret, &kOwnerSecret); | 
 |  | 
 |     // Lock otp secret partition. | 
 |     dif_otp_ctrl_t otp; | 
 |     CHECK_DIF_OK(dif_otp_ctrl_init( | 
 |         mmio_region_from_addr(TOP_EARLGREY_OTP_CTRL_CORE_BASE_ADDR), &otp)); | 
 |     otp_ctrl_testutils_lock_partition(&otp, kDifOtpCtrlPartitionSecret2, 0); | 
 |  | 
 |     // Reboot device. | 
 |     rstmgr_testutils_reason_clear(); | 
 |     CHECK_DIF_OK(dif_rstmgr_software_device_reset(&rstmgr)); | 
 |  | 
 |     // Wait here until device reset. | 
 |     wait_for_interrupt(); | 
 |  | 
 |   } else { | 
 |     CHECK(info == kDifRstmgrResetInfoSw, "Unexpected reset reason: %08x", info); | 
 |     LOG_INFO( | 
 |         "Powered up for the second time, actuate keymgr and perform test."); | 
 |  | 
 |     // Initialize KMAC in preparation for keymgr use. | 
 |     CHECK_DIF_OK(dif_kmac_init( | 
 |         mmio_region_from_addr(TOP_EARLGREY_KMAC_BASE_ADDR), kmac)); | 
 |  | 
 |     // We shouldn't use the KMAC block's default entropy setting for keymgr, so | 
 |     // configure it to use software entropy (and a sideloaded key, although it | 
 |     // shouldn't matter here and tests should reconfigure if needed). | 
 |     kmac_testutils_config(kmac, true); | 
 |  | 
 |     // Initialize keymgr context. | 
 |     CHECK_DIF_OK(dif_keymgr_init( | 
 |         mmio_region_from_addr(TOP_EARLGREY_KEYMGR_BASE_ADDR), keymgr)); | 
 |  | 
 |     // Advance to Initialized state. | 
 |     keymgr_testutils_check_state(keymgr, kDifKeymgrStateReset); | 
 |     keymgr_testutils_advance_state(keymgr, NULL); | 
 |     keymgr_testutils_check_state(keymgr, kDifKeymgrStateInitialized); | 
 |     LOG_INFO("Keymgr entered Init State"); | 
 |  | 
 |     // Advance to CreatorRootKey state. | 
 |     if (is_using_test_rom) { | 
 |       LOG_INFO("Using test_rom, setting inputs and advancing state..."); | 
 |       keymgr_testutils_advance_state(keymgr, &kCreatorParams); | 
 |     } else { | 
 |       LOG_INFO("Using rom, only advancing state..."); | 
 |       CHECK_DIF_OK(dif_keymgr_advance_state_raw(keymgr)); | 
 |       keymgr_testutils_wait_for_operation_done(keymgr); | 
 |     } | 
 |     keymgr_testutils_check_state(keymgr, kDifKeymgrStateCreatorRootKey); | 
 |     LOG_INFO("Keymgr entered CreatorRootKey State"); | 
 |  | 
 |     // Identity generation is not really necessary for all tests, but it is | 
 |     // added to make sure each test using this function is also compatible with | 
 |     // the DV_WAIT sequences from keymgr_key_derivation vseq | 
 |     keymgr_testutils_generate_identity(keymgr); | 
 |     LOG_INFO("Keymgr generated identity at CreatorRootKey State"); | 
 |   } | 
 | } | 
 |  | 
 | void keymgr_testutils_advance_state(const dif_keymgr_t *keymgr, | 
 |                                     const dif_keymgr_state_params_t *params) { | 
 |   CHECK_DIF_OK(dif_keymgr_advance_state(keymgr, params)); | 
 |   keymgr_testutils_wait_for_operation_done(keymgr); | 
 | } | 
 |  | 
 | void keymgr_testutils_check_state(const dif_keymgr_t *keymgr, | 
 |                                   const dif_keymgr_state_t exp_state) { | 
 |   dif_keymgr_state_t act_state; | 
 |   CHECK_DIF_OK(dif_keymgr_get_state(keymgr, &act_state)); | 
 |   CHECK(act_state == exp_state, | 
 |         "Keymgr in unexpected state: %x, expected to be %x", act_state, | 
 |         exp_state); | 
 | } | 
 |  | 
 | void keymgr_testutils_generate_identity(const dif_keymgr_t *keymgr) { | 
 |   CHECK_DIF_OK(dif_keymgr_generate_identity_seed(keymgr)); | 
 |   keymgr_testutils_wait_for_operation_done(keymgr); | 
 | } | 
 |  | 
 | void keymgr_testutils_generate_versioned_key( | 
 |     const dif_keymgr_t *keymgr, | 
 |     const dif_keymgr_versioned_key_params_t params) { | 
 |   CHECK_DIF_OK(dif_keymgr_generate_versioned_key(keymgr, params)); | 
 |   keymgr_testutils_wait_for_operation_done(keymgr); | 
 | } | 
 |  | 
 | void keymgr_testutils_disable(const dif_keymgr_t *keymgr) { | 
 |   CHECK_DIF_OK(dif_keymgr_disable(keymgr)); | 
 |   keymgr_testutils_wait_for_operation_done(keymgr); | 
 | } | 
 |  | 
 | void keymgr_testutils_wait_for_operation_done(const dif_keymgr_t *keymgr) { | 
 |   dif_keymgr_status_codes_t status; | 
 |   do { | 
 |     CHECK_DIF_OK(dif_keymgr_get_status_codes(keymgr, &status)); | 
 |   } while (status == 0); | 
 |   CHECK(status == kDifKeymgrStatusCodeIdle, "Unexpected status: %x", status); | 
 | } |