For detailed information on KEYMGR design features, please see the [KEYMGR HWIP technical specification]({{< relref “..” >}}).
KEYMGR testbench has been constructed based on the [CIP testbench architecture]({{< relref “hw/dv/sv/cip_lib/doc” >}}).
Top level testbench is located at hw/ip/keymgr/dv/tb/tb.sv
. It instantiates the KEYMGR DUT module hw/ip/keymgr/rtl/keymgr.sv
. In addition, it instantiates the following interfaces, connects them to the DUT and sets their handle into uvm_config_db
:
keymgr_if
)pins_if
]({{< relref “hw/dv/sv/common_ifs” >}}))alert_esc_if
]({{< relref “hw/dv/sv/alert_esc_agent/doc” >}}))pins_if
]({{< relref “hw/dv/sv/common_ifs” >}}))The following utilities provide generic helper tasks and functions to perform activities that are common across the project:
[list compile time configurations, if any and what are they used for]
All common types and methods defined at the package level can be found in keymgr_env_pkg
. Some of them in use are:
[list a few parameters, types & methods; no need to mention all]
KEYMGR testbench instantiates (already handled in CIP base env) [tl_agent]({{< relref “hw/dv/sv/tl_agent/doc” >}}) which provides the ability to drive and independently monitor random traffic via TL host interface into KEYMGR device.
The KEYMGR testbench instantiates a push_pull_agent
in Pull
mode as the agent modelling the [EDN interface]({{< relref “hw/dv/sv/push_pull_agent/doc” >}}) (this is already handled in the CIP base classes). This agent will return random data as entropy when the KEYMGR sends a request.
The KEYMGR testbench instantiates a [kmac_app_agent
]({{< relref “hw/dv/sv/kmac_app_agent/doc” >}}) to request a KMAC hash operation on the secret data.
The KEYMGR RAL model is created with the [ralgen
]({{< relref “hw/dv/tools/ralgen/doc” >}}) FuseSoC generator script automatically when the simulation is at the build stage.
It can be created manually by invoking [regtool
]({{< relref “util/reggen/doc” >}}):
[Describe reference models in use if applicable, example: SHA256/HMAC]
All test sequences reside in hw/ip/keymgr/dv/env/seq_lib
. The keymgr_base_vseq
virtual sequence is extended from cip_base_vseq
and serves as a starting point. All test sequences are extended from keymgr_base_vseq
. It provides commonly used handles, variables, functions and tasks that the test sequences can simple use / call. Some of the most commonly used tasks / functions are as follows:
op_status
until it returns success / fail status, as well as checking if the status is expected.sw_share_output
to allow scoreboard to check the values.To ensure high quality constrained random stimulus, it is necessary to develop a functional coverage model. The covergroups defined in testplan have been developed to prove that the test intent has been adequately met.
The keymgr_scoreboard
is primarily used for end to end checking. It creates the following analysis ports to retrieve the data monitored by corresponding interface agents:
tb/keymgr_bind.sv
binds the tlul_assert
[assertions]({{< relref “hw/ip/tlul/doc/TlulProtocolChecker.md” >}}) to the IP to ensure TileLink interface protocol compliance.reseed_interval
.We are using our in-house developed [regression tool]({{< relref “hw/dv/tools/doc” >}}) for building and running our tests and regressions. Please take a look at the link for detailed information on the usage, capabilities, features and known issues. Here's how to run a smoke test:
$ $REPO_TOP/util/dvsim/dvsim.py $REPO_TOP/hw/ip/keymgr/dv/keymgr_sim_cfg.hjson -i keymgr_smoke
{{< incGenFromIpDesc “../../data/keymgr_testplan.hjson” “testplan” >}}