blob: c35fdf0d73b3208e1405767a937c28815ebe2f69 [file] [log] [blame]
// Copyright lowRISC contributors.
// Licensed under the Apache License, Version 2.0, see LICENSE for details.
// SPDX-License-Identifier: Apache-2.0
//
module tb;
// dep packages
import uvm_pkg::*;
import dv_utils_pkg::*;
import entropy_src_env_pkg::*;
import entropy_src_test_pkg::*;
// macro includes
`include "uvm_macros.svh"
`include "dv_macros.svh"
wire clk, rst_n, devmode;
//
// An additional local reset for the csrng pull agent
//
// This is needed in particular for this pull agent as
// the entropy source may (by design!) become unable to provide
// seeds to the CSRNG under certain conditions. This reset
// communicates to the agent that it is time to cleanly exit.
// By using a reset, the VIF is allowed to clear REQ, within
// triggering an assertion.
wire csrng_rst_n;
wire [NUM_MAX_INTERRUPTS-1:0] interrupts;
wire [7:0] otp_en_es_fw_read, otp_en_es_fw_over;
// interfaces
clk_rst_if clk_rst_if(.clk(clk), .rst_n(rst_n));
clk_rst_if csrng_rst_if(.clk(), .rst_n(csrng_rst_n));
pins_if#(NUM_MAX_INTERRUPTS) intr_if(interrupts);
pins_if#(1) devmode_if(devmode);
pins_if#(8) otp_en_es_fw_read_if(otp_en_es_fw_read);
pins_if#(8) otp_en_es_fw_over_if(otp_en_es_fw_over);
tl_if tl_if(.clk(clk), .rst_n(rst_n));
push_pull_if#(.HostDataWidth(entropy_src_pkg::RNG_BUS_WIDTH))
rng_if(.clk(clk), .rst_n(csrng_rst_n));
push_pull_if#(.HostDataWidth(entropy_src_pkg::FIPS_CSRNG_BUS_WIDTH))
csrng_if(.clk(clk), .rst_n(csrng_rst_n));
push_pull_if#(.HostDataWidth(0)) aes_halt_if(.clk(clk), .rst_n(csrng_rst_n && rst_n));
entropy_src_xht_if xht_if(.clk(clk), .rst_n(rst_n));
entropy_src_path_if entropy_src_path_if (.entropy_src_hw_if_i(entropy_src_hw_if_i));
entropy_src_assert_if entropy_src_assert_if (.entropy_src_hw_if_i(entropy_src_hw_if_i));
`DV_ALERT_IF_CONNECT()
// dut
entropy_src dut (
.clk_i (clk ),
.rst_ni (rst_n ),
.tl_i (tl_if.h2d ),
.tl_o (tl_if.d2h ),
.otp_en_entropy_src_fw_read_i (prim_mubi_pkg::mubi8_t'(otp_en_es_fw_read)),
.otp_en_entropy_src_fw_over_i (prim_mubi_pkg::mubi8_t'(otp_en_es_fw_over)),
.entropy_src_hw_if_o ({csrng_if.ack,
csrng_if.d_data[entropy_src_pkg::CSRNG_BUS_WIDTH-1:0],
csrng_if.d_data[entropy_src_pkg::CSRNG_BUS_WIDTH]}),
.entropy_src_hw_if_i (csrng_if.req),
.cs_aes_halt_o (aes_halt_if.req),
.cs_aes_halt_i (aes_halt_if.ack),
.entropy_src_xht_o (xht_if.req),
.entropy_src_xht_i (xht_if.rsp),
.entropy_src_rng_o (rng_if.ready),
.entropy_src_rng_i ({rng_if.valid, rng_if.h_data}),
.alert_rx_i (alert_rx),
.alert_tx_o (alert_tx),
.intr_es_entropy_valid_o (intr_entropy_valid),
.intr_es_health_test_failed_o (intr_health_test_failed),
.intr_es_observe_fifo_ready_o (intr_observe_fifo_ready),
.intr_es_fatal_err_o (intr_fatal_err)
);
assign interrupts[EntropyValid] = intr_entropy_valid;
assign interrupts[HealthTestFailed] = intr_health_test_failed;
assign interrupts[ObserveFifoReady] = intr_observe_fifo_ready;
assign interrupts[FatalErr] = intr_fatal_err;
bind prim_packer_fifo : dut.u_entropy_src_core.u_prim_packer_fifo_precon
entropy_subsys_fifo_exception_if#(1) u_fifo_exc_if (.clk_i, .rst_ni, .wready_o, .wvalid_i);
bind prim_packer_fifo : dut.u_entropy_src_core.u_prim_packer_fifo_bypass
entropy_subsys_fifo_exception_if#(1) u_fifo_exc_if (.clk_i, .rst_ni, .wready_o, .wvalid_i);
bind prim_sparse_fsm_flop : dut.u_entropy_src_core.u_entropy_src_main_sm.u_state_regs
entropy_src_fsm_cov_if u_fsm_cov_if (.clk_i, .state_i, .state_o);
initial begin
// Drive clk and rst_n from clk_if
// Set interfaces in config_db
clk_rst_if.set_active();
// The rng_if (which mimics the AST RNG) is expected to drop RNG inputs even if the
// DUT is not ready.
$assertoff(0, tb.rng_if.H_DataStableWhenValidAndNotReady_A);
$assertoff(0, tb.rng_if.ValidHighUntilReady_A);
csrng_rst_if.set_active();
uvm_config_db#(virtual clk_rst_if)::set(null, "*.env", "clk_rst_vif", clk_rst_if);
uvm_config_db#(virtual clk_rst_if)::set(null, "*.env", "csrng_rst_vif", csrng_rst_if);
uvm_config_db#(intr_vif)::set(null, "*.env", "intr_vif", intr_if);
uvm_config_db#(devmode_vif)::set(null, "*.env", "devmode_vif", devmode_if);
uvm_config_db#(virtual entropy_src_cov_if)::set(null, "*.env", "entropy_src_cov_if",
dut.u_entropy_src_cov_if);
uvm_config_db#(virtual pins_if#(8))::set(null, "*.env", "otp_en_es_fw_read_vif",
otp_en_es_fw_read_if);
uvm_config_db#(virtual pins_if#(8))::set(null, "*.env", "otp_en_es_fw_over_vif",
otp_en_es_fw_over_if);
uvm_config_db#(virtual tl_if)::set(null, "*.env.m_tl_agent*", "vif", tl_if);
uvm_config_db#(virtual entropy_subsys_fifo_exception_if#(1))::set(null, "*.env",
"precon_fifo_vif", dut.u_entropy_src_core.u_prim_packer_fifo_precon.u_fifo_exc_if);
uvm_config_db#(virtual entropy_subsys_fifo_exception_if#(1))::set(null, "*.env",
"bypass_fifo_vif", dut.u_entropy_src_core.u_prim_packer_fifo_bypass.u_fifo_exc_if);
uvm_config_db#(virtual entropy_src_fsm_cov_if)::set(null, "*.env", "main_sm_cov_vif",
dut.u_entropy_src_core.u_entropy_src_main_sm.u_state_regs.u_fsm_cov_if);
uvm_config_db#(virtual push_pull_if#(.HostDataWidth(entropy_src_pkg::RNG_BUS_WIDTH)))::set
(null, "*.env.m_rng_agent*", "vif", rng_if);
uvm_config_db#(virtual push_pull_if#(.HostDataWidth(entropy_src_pkg::FIPS_CSRNG_BUS_WIDTH)))::
set(null, "*.env.m_csrng_agent*", "vif", csrng_if);
uvm_config_db#(virtual push_pull_if#(.HostDataWidth(0)))::
set(null, "*.env.m_aes_halt_agent*", "vif", aes_halt_if);
uvm_config_db#(virtual entropy_src_xht_if)::set(null, "*.env.m_xht_agent*", "vif", xht_if);
uvm_config_db#(virtual entropy_src_assert_if)::set(null, "*.env", "entropy_src_assert_vif",
entropy_src_assert_if);
uvm_config_db#(virtual entropy_src_path_if)::set(null, "*.env", "entropy_src_path_vif",
entropy_src_path_if);
$timeformat(-12, 0, " ps", 12);
run_test();
end
endmodule