Testplan

Testpoints

Stage V1 Testpoints

wake_up

Test: aes_wake_up

Basic hello world, encrypt a plain text read it back - decrypt and compare to input.

smoke

Test: aes_smoke

Encrypt a plain text read it back - decrypt and compare to input but use reference model to compare after both encryption and decryption.

csr_hw_reset

Test: aes_csr_hw_reset

Verify the reset values as indicated in the RAL specification.

  • Write all CSRs with a random value.
  • Apply reset to the DUT as well as the RAL model.
  • Read each CSR and compare it against the reset value. it is mandatory to replicate this test for each reset that affects all or a subset of the CSRs.
  • It is mandatory to run this test for all available interfaces the CSRs are accessible from.
  • Shuffle the list of CSRs first to remove the effect of ordering.

csr_rw

Test: aes_csr_rw

Verify accessibility of CSRs as indicated in the RAL specification.

  • Loop through each CSR to write it with a random value.
  • Read the CSR back and check for correctness while adhering to its access policies.
  • It is mandatory to run this test for all available interfaces the CSRs are accessible from.
  • Shuffle the list of CSRs first to remove the effect of ordering.

csr_bit_bash

Test: aes_csr_bit_bash

Verify no aliasing within individual bits of a CSR.

  • Walk a 1 through each CSR by flipping 1 bit at a time.
  • Read the CSR back and check for correctness while adhering to its access policies.
  • This verify that writing a specific bit within the CSR did not affect any of the other bits.
  • It is mandatory to run this test for all available interfaces the CSRs are accessible from.
  • Shuffle the list of CSRs first to remove the effect of ordering.

csr_aliasing

Test: aes_csr_aliasing

Verify no aliasing within the CSR address space.

  • Loop through each CSR to write it with a random value
  • Shuffle and read ALL CSRs back.
  • All CSRs except for the one that was written in this iteration should read back the previous value.
  • The CSR that was written in this iteration is checked for correctness while adhering to its access policies.
  • It is mandatory to run this test for all available interfaces the CSRs are accessible from.
  • Shuffle the list of CSRs first to remove the effect of ordering.

csr_mem_rw_with_rand_reset

Test: aes_csr_mem_rw_with_rand_reset

Verify random reset during CSR/memory access.

  • Run csr_rw sequence to randomly access CSRs
  • If memory exists, run mem_partial_access in parallel with csr_rw
  • Randomly issue reset and then use hw_reset sequence to check all CSRs are reset to default value
  • It is mandatory to run this test for all available interfaces the CSRs are accessible from.

regwen_csr_and_corresponding_lockable_csr

Tests:

  • aes_csr_rw
  • aes_csr_aliasing

Verify regwen CSR and its corresponding lockable CSRs.

  • Randomly access all CSRs
  • Test when regwen CSR is set, its corresponding lockable CSRs become read-only registers

Note:

  • If regwen CSR is HW read-only, this feature can be fully tested by common CSR tests - csr_rw and csr_aliasing.
  • If regwen CSR is HW updated, a separate test should be created to test it.

This is only applicable if the block contains regwen and locakable CSRs.

Stage V2 Testpoints

algorithm

Tests:

  • aes_smoke
  • aes_stress
  • aes_config_error

Compare cypher text from DUT with the output of a C model using same key and data.

key_length

Tests:

  • aes_stress
  • aes_smoke
  • aes_config_error

Randomly select key length to verify all supported key lengths are working.

back2back

Tests:

  • aes_b2b
  • aes_stress

Back to back Messages are not possible as the DUT need to be idle before writing a new configuration. But Back2back verifies that DUT can handle back to back data blocks and other spacings.

backpressure

Test: aes_stress

Try to write data to registers without offloading the DUT output to verify Stall functionality.

multi_message

Tests:

  • aes_stress
  • aes_smoke
  • aes_config_error
  • aes_alert_reset

Run multiple messages in a random mix of encryption / decryption. Each message should select its mode randomly.

failure_test

Tests:

  • aes_config_error

  • aes_alert_reset

  • aes_man_cfg_err

  • Tests what happens if a register is written a the wrong time? If a key does not match the key setting etc. Will the DUT ignore or fail gracefully.

  • Enter a 256bit key but set DUT to use 128bit for encryption. Then enter the 128bit of the key and use for decryption. Will result match plain text and vice.

  • Write unsupported configurations (Key length and mode are 1 hot, what happens if more than one bit is set.)

trigger_clear_test

Test: aes_clear

Exercise trigger and clear registers at random times to make sure we handle the different cornercases correctly. Example of a cornercases clearing data input or data output before the data is consumed or the DUT finishes an operation.

nist_test_vectors

Test: aes_nist_vectors

Verify that the DUT handles the NIST test vectors correctly.

reset_recovery

Test: aes_alert_reset

Pull reset at random times, make sure DUT recover/resets correctly and there is no residual data left in the registers.

stress

Test: aes_stress

This will combine the other individual testpoints to ensure we stress test everything across the board.

sideload

Tests:

  • aes_stress
  • aes_sideload

Verify that DUT uses sideload correctly when sideload is enabled. and that it ignores any valid on the bus when disabled.

deinitialization

Test: aes_deinit

Make sure that there is no residual data from latest operation.

stress_all

Test: aes_stress_all

Run assorted sequences back-to-back.

alert_test

Test: aes_alert_test

Verify common alert_test CSR that allows SW to mock-inject alert requests.

  • Enable a random set of alert requests by writing random value to alert_test CSR.
  • Check each alert_tx.alert_p pin to verify that only the requested alerts are triggered.
  • During alert_handshakes, write alert_test CSR again to verify that: If alert_test writes to current ongoing alert handshake, the alert_test request will be ignored. If alert_test writes to current idle alert handshake, a new alert_handshake should be triggered.
  • Wait for the alert handshakes to finish and verify alert_tx.alert_p pins all sets back to 0.
  • Repeat the above steps a bunch of times.

tl_d_oob_addr_access

Test: aes_tl_errors

Access out of bounds address and verify correctness of response / behavior

tl_d_illegal_access

Test: aes_tl_errors

Drive unsupported requests via TL interface and verify correctness of response / behavior. Below error cases are tested bases on the TLUL spec

  • TL-UL protocol error cases
    • invalid opcode
    • some mask bits not set when opcode is PutFullData
    • mask does not match the transfer size, e.g. a_address = 0x00, a_size = 0, a_mask = 'b0010
    • mask and address misaligned, e.g. a_address = 0x01, a_mask = 'b0001
    • address and size aren’t aligned, e.g. a_address = 0x01, a_size != 0
    • size is greater than 2
  • OpenTitan defined error cases
    • access unmapped address, expect d_error = 1
    • write a CSR with unaligned address, e.g. a_address[1:0] != 0
    • write a CSR less than its width, e.g. when CSR is 2 bytes wide, only write 1 byte
    • write a memory with a_mask != '1 when it doesn’t support partial accesses
    • read a WO (write-only) memory
    • write a RO (read-only) memory
    • write with instr_type = True

tl_d_outstanding_access

Tests:

  • aes_csr_hw_reset
  • aes_csr_rw
  • aes_csr_aliasing
  • aes_same_csr_outstanding

Drive back-to-back requests without waiting for response to ensure there is one transaction outstanding within the TL device. Also, verify one outstanding when back- to-back accesses are made to the same address.

tl_d_partial_access

Tests:

  • aes_csr_hw_reset
  • aes_csr_rw
  • aes_csr_aliasing
  • aes_same_csr_outstanding

Access CSR with one or more bytes of data. For read, expect to return all word value of the CSR. For write, enabling bytes should cover all CSR valid fields.

Stage V2S Testpoints

reseeding

Test: aes_reseed

Verify that internal PRNGs are effectively reseeded upon manually triggering a PRNG reseed, and - depending on the configuration - if the initial key changes. Verify that the masking PRNG is reseeded automatically at the correct reseed rate. To reduce simulation time, the block counter triggering the automatic reseeding is manually changed to lower values. Verify that the PRNGs do not get reseeded unexpectedly. Verify that the data received from EDN effectively propagates into the PRNGs.

fault_inject

Tests:

  • aes_fi
  • aes_control_fi
  • aes_cipher_fi

Verify that injecting bit errors in one of the state machines or the round counter triggers an error

shadow_reg_update_error

Test: aes_shadow_reg_errors

Verify shadowed registers’ update error.

  • Randomly pick a shadowed register in the DUT.
  • Write it twice with different values.
  • Verify that the update error alert is triggered and the register value remains unchanged.
  • Verify the update_error status register field is set to 1.
  • Repeat the above steps a bunch of times.

shadow_reg_read_clear_staged_value

Test: aes_shadow_reg_errors

Verify reading a shadowed register will clear its staged value.

  • Randomly pick a shadowed register in the DUT.
  • Write it once and read it back to clear the staged value.
  • Then write it twice with the same new value (but different from the previous step).
  • Read it back to verify the new value and ensure that the update error alert did not trigger.
  • Verify the update_error status register field remains the same value.
  • Repeat the above steps a bunch of times.

shadow_reg_storage_error

Test: aes_shadow_reg_errors

Verify shadowed registers’ storage error.

  • Randomly pick a shadowed register in the DUT.
  • Backdoor write to shadowed or committed flops to create a storage fatal alert.
  • Check if fatal alert continuously fires until reset.
  • Verify that all other frontdoor write attempts are blocked during the storage error.
  • Verify that storage_error status register field is set to 1.
  • Reset the DUT.
  • Read all CSRs to ensure the DUT is properly reset.
  • Repeat the above steps a bunch of times.

shadowed_reset_glitch

Test: aes_shadow_reg_errors

Verify toggle shadowed_rst_n pin can trigger storage error.

  • Randomly drive shadowed_rst_n pin to low or rst_n pin to low.
  • check if any registers have been written before the reset. If so check if storage error fatal alert is triggered.
  • Check status register.
  • Drive shadowed_rst_n pin or rst_n pin back to high.
  • If fatal alert is triggered, reset the DUT.
  • Read all CSRs to ensure the DUT is properly reset.
  • Repeat the above steps a bunch of times.

shadow_reg_update_error_with_csr_rw

Test: aes_shadow_reg_errors_with_csr_rw

Run shadow_reg_update_error sequence in parallel with csr_rw sequence.

  • Randomly select one of the above sequences.
  • Apply csr_rw sequence in parallel but disable the csr_access_abort to ensure all shadowed registers’ write/read to be executed without aborting.
  • Repeat the above steps a bunch of times.

tl_intg_err

Tests:

  • aes_tl_intg_err
  • aes_sec_cm

Verify that the data integrity check violation generates an alert.

  • Randomly inject errors on the control, data, or the ECC bits during CSR accesses. Verify that triggers the correct fatal alert.
  • Inject a fault at the onehot check in u_reg.u_prim_reg_we_check and verify the corresponding fatal alert occurs

sec_cm_bus_integrity

Test: aes_tl_intg_err

Verify the countermeasure(s) BUS.INTEGRITY.

sec_cm_lc_escalate_en_intersig_mubi

Test: aes_alert_reset

Verify the countermeasure(s) LC_ESCALATE_EN.INTERSIG.MUBI. Upon randomly switching the life cycle escalation input signal, it is ensured that the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_main_config_shadow

Test: aes_shadow_reg_errors

Verify the countermeasure(s) MAIN.CONFIG.SHADOW.

sec_cm_main_config_sparse

Tests:

  • aes_stress
  • aes_smoke
  • aes_alert_reset
  • aes_core_fi

Verify the countermeasure(s) MAIN.CONFIG.SPARSE. Illegally encoded values are written into the main control register via register interface and it is ensured that the values are resolved to the correct legal values. Internal wires carrying the corresponding signals are forced to invalid values and depending on the target wire it is ensured that the DUT stops processing data and signals an alert.

sec_cm_aux_config_shadow

Test: aes_shadow_reg_errors

Verify the countermeasure(s) AUX.CONFIG.SHADOW.

sec_cm_aux_config_regwen

Tests:

  • aes_stress
  • aes_readability

Verify the countermeasure(s) AUX.CONFIG.REGWEN. It is ensured that once the REGWEN bit is set to 0, the content of the CTRL_AUX_SHADOWED register cannot be altered anymore until reset.

sec_cm_key_sideload

Tests:

  • aes_stress
  • aes_sideload

Verify the countermeasure(s) KEY.SIDELOAD.

sec_cm_key_sw_unreadable

Test: aes_readability

Verify the countermeasure(s) KEY.SW_UNREADABLE. It is ensured that the initial key registers cannot be read via register interface.

sec_cm_data_reg_sw_unreadable

Test: aes_readability

Verify the countermeasure(s) DATA_REG.SW_UNREADABLE. It is ensured that the input data registers cannot be read via register interface.

sec_cm_key_sec_wipe

Test: aes_readability

Verify the countermeasure(s) KEY.SEC_WIPE. It is ensured that after triggering the clearing of the initial key registers with pseudo-random data, the content of these registers indeed changes to a different value.

sec_cm_iv_config_sec_wipe

Test: aes_readability

Verify the countermeasure(s) IV.CONFIG.SEC_WIPE. It is ensured that after triggering the clearing of the IV registers with pseudo-random data, the values read back from these registers via register interface indeed change.

sec_cm_data_reg_sec_wipe

Test: aes_readability

Verify the countermeasure(s) DATA_REG.SEC_WIPE. It is ensured that after triggering the clearing of the input and output data registers with pseudo-random data, the values read back from output data registers via register interface indeed change and that the content of the input data registers changes to a different value.

sec_cm_data_reg_key_sca

Test: aes_stress

Verify the countermeasure(s) DATA_REG.KEY.SCA. SVAs inside aes_cipher_core.sv check that the internal state register gets cleared with pseudo-random data at the end of the last round of every encryption.

sec_cm_key_masking

Test: aes_stress

Verify the countermeasure(s) KEY.MASKING. SVAs inside aes_cipher_core.sv are used to check some aspects of the masking countermeasure. However, the actual verification of the masking countermeasure cannot be done in DV though. FPGA measurements and formal masking verification tools are used for that purpose.

sec_cm_main_fsm_sparse

Test: aes_fi

Verify the countermeasure(s) MAIN.FSM.SPARSE. It is ensured that upon randomly forcing bits in the state register of the main FSM, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_main_fsm_redun

Tests:

  • aes_fi
  • aes_control_fi
  • aes_cipher_fi
  • aes_ctr_fi

Verify the countermeasure(s) MAIN.FSM.REDUN. It is ensured that upon randomly forcing the state, inputs or outputs of any of the independent, redundant logic rails of the main FSM to both valid and invalid encodings, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_cipher_fsm_sparse

Test: aes_fi

Verify the countermeasure(s) CIPHER.FSM.SPARSE. It is ensured that upon randomly forcing bits in the state register of the cipher core FSM, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_cipher_fsm_redun

Tests:

  • aes_fi
  • aes_control_fi
  • aes_cipher_fi

Verify the countermeasure(s) CIPHER.FSM.REDUN. It is ensured that upon randomly forcing the state, inputs or outputs of any of the independent, redundant logic rails of the cipher core FSM to both valid and invalid encodings, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_cipher_ctr_redun

Test: aes_cipher_fi

Verify the countermeasure(s) CIPHER.CTR.REDUN. It is ensured that upon randomly forcing the value of any of the independent, redundant logic rails of round counter inside the cipher core FSM, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_ctr_fsm_sparse

Test: aes_fi

Verify the countermeasure(s) CTR.FSM.SPARSE. It is ensured that upon randomly forcing bits in the state register of the CTR mode FSM, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_ctr_fsm_redun

Tests:

  • aes_fi
  • aes_control_fi
  • aes_ctr_fi

Verify the countermeasure(s) CTR.FSM.REDUN. It is ensured that upon randomly forcing the state, inputs or outputs of any of the independent, redundant logic rails of the CTR mode FSM to both valid and invalid encodings, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_ctrl_sparse

Tests:

  • aes_fi
  • aes_control_fi
  • aes_cipher_fi
  • aes_ctr_fi

Verify the countermeasure(s) CTRL.SPARSE. It is ensured that upon randomly forcing the value of any of these critical control signals to an invalid encoding, the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_main_fsm_global_esc

Test: aes_alert_reset

Verify the countermeasure(s) MAIN.FSM.GLOBAL_ESC. Upon randomly switching the life cycle escalation input signal, it is ensured that the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_main_fsm_local_esc

Tests:

  • aes_fi
  • aes_control_fi
  • aes_cipher_fi
  • aes_ctr_fi

Verify the countermeasure(s) MAIN.FSM.LOCAL_ESC. Upon detecting a local alert condition it is ensured that the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_cipher_fsm_local_esc

Tests:

  • aes_fi
  • aes_control_fi
  • aes_cipher_fi
  • aes_ctr_fi

Verify the countermeasure(s) CIPHER.FSM.LOCAL_ESC. Upon detecting a local alert condition it is ensured that the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_ctr_fsm_local_esc

Tests:

  • aes_fi
  • aes_control_fi
  • aes_ctr_fi

Verify the countermeasure(s) CTR.FSM.LOCAL_ESC. Upon detecting a local alert condition it is ensured that the DUT stops processing data, locks up and triggers a fatal alert.

sec_cm_data_reg_local_esc

Tests:

  • aes_fi
  • aes_control_fi
  • aes_cipher_fi

Verify the countermeasure(s) DATA_REG.LOCAL_ESC. SVAs inside aes_core.sv are used to ensure that upon local escalation triggered through FI the cipher core doesn’t release intermediate state into the readable output data or IV registers.

Stage V3 Testpoints

stress_all_with_rand_reset

Test: aes_stress_all_with_rand_reset

This test runs 3 parallel threads - stress_all, tl_errors and random reset. After reset is asserted, the test will read and check all valid CSR registers.

Covergroups

ctrl_aux_cg

Covers when enabled a complete write forces a reseed. this is done by checking the DUT goes out of idle state after a full key has been provided. also covers that this is not the case then key_touch_forces_reseed = 0.

ctrl_reg_cg

Covers that all valid settings have been tested. Further more it covers that also illegal values have been tested. Individual control settings that are covered includes:

  • operation (encode/decode/illegal)
  • mode (all modes + illegal/aes_none)
  • key_len (128/192/256 + illegal)
  • sideload
  • prng_reseed_rate(all + illegal)
  • manual operation

All valid combinations of these will be crossed.

dut_busy_cg

Cover that a busy DUT cannot be manipulated. This includes:

  • Trying to change the configuration (CTRL)
  • Trying to change the key
  • Trying to change the IV

fault_inject_cg

Cover that a recoverable error has been seen:

  • When the DUT is idle but just about to start
  • When the DUT is busy

key_iv_data_cg

Covers that these registers have been written in random order and interleaved and that it has triggered an operation.

  • the individual registers (KEY/IV/DATA) can be written in random order
  • The writes to these registers can also be interleaved
  • Data out can be read in random order

regwen_val_when_new_value_written_cg

Cover each lockable reg field with these 2 cases:

  • When regwen = 1, a different value is written to the lockable CSR field, and a read occurs after that.
  • When regwen = 0, a different value is written to the lockable CSR field, and a read occurs after that.

This is only applicable if the block contains regwen and locakable CSRs.

reseed_cg

Cover that the different reseed configurations has been used.

  • reseed_rate (per_1, per_64, per_8k)

self_clearing_cg

Cover that the DUT self clearing is working correctly. An attack could be made by triggering an operation after a reset without configuring the DUT. The self clearing mechanism should prevent the DUT from starting. This mechanism should also clear any data in the output register with random data After a reset is pulled two things will be covered

  • manually write trigger.start and poll status.idle and make sure the DUT stays in idle.
  • read output registers make sure output is no longer present

shadow_field_errs_cg

Cover all shadow register errors for each register field.

For all register fields within the shadowed register, this coverpoint covers the following errors:

  • Update error
  • Storage error

sideload_cg

Cover sideload functionality This includes:

  • That an operation does not start before a valid key is present at the sideload interface with sideload enabled.
  • That a key on the sideload interface is not consumed when sideload is disabled.

status_cg

Covers the different status bits was seen

tl_errors_cg

Cover the following error cases on TL-UL bus:

  • TL-UL protocol error cases.
  • OpenTitan defined error cases, refer to testpoint tl_d_illegal_access.

tl_intg_err_cg

Cover all kinds of integrity errors (command, data or both) and cover number of error bits on each integrity check.

Cover the kinds of integrity errors with byte enabled write on memory if applicable: Some memories store the integrity values. When there is a subword write, design re-calculate the integrity with full word data and update integrity in the memory. This coverage ensures that memory byte write has been issued and the related design logic has been verfied.

trigger_cg

This covergroup has two very different cover points.

  • start covers that a start initiates an operation in manual mode. and that it does not when not in manual mode
  • that a write to key_iv_data_in/data_out_clear clear clears the data from the register Additionally it covers that going from automatic mode to manual mode it is not possible to trigger a start without configuring the DUT (writing to CTRL should trigger a need for new configuration) The prng reseed is covered by the reseed_cg